This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Quzara, a leading Cyber Security Firm, is seeking a highly skilled and experienced L2 SOC Analyst to join our Security Operations Center (SOC). This fully remote role is critical to our mission of protecting our clients from cybersecurity threats. The L2 SOC Analyst will be responsible for monitoring and analyzing security events, identifying and investigating potential security threats, and responding to security incidents. The ideal candidate will have a deep understanding of cybersecurity technologies, threat intelligence, and incident response procedures, with a strong background in using Microsoft security technologies and tools.
Job Responsibility:
Monitor and analyze security events utilizing advanced security technologies and tools such as Microsoft Sentinel, Defender technologies, and Log Analytics
Utilize deep threat intelligence to identify and investigate potential security threats
Respond to and triage security incidents, escalating as necessary
Utilize proficiency in KQL Queries to conduct investigations and gain insights into potential security threats
Collaborate with other teams to resolve security incidents and improve overall security posture
Participate in incident response efforts and assist in forensic investigations, adhering to NIST guidelines
Continuously improve security operations through the identification of trends and anomalies
Communicate security incidents and findings to stakeholders and management
Requirements:
At least 5+ years of experience in a SOC Analyst role at a SOC/MXDR or MSSP with L2 experience
Strong understanding of networking technologies
Experience with Microsoft security technologies such as Microsoft Sentinel and M365 Defender
Strong understanding of security best practices and incident response procedures
Experience with deep threat intelligence
Strong proficiency with KQL Queries
Strong verbal and written communication skills
Strong analytical and problem-solving skills
Azure experience working with azure security is a must
Experience with scripting languages such as Python, PowerShell, and JavaScript
Experience working in government environments
Familiarity with incident response requirements based on NIST guidelines
Willingness to work in a 24/7 environment
Experience with techniques utilizing the MITRE ATT&CK framework for incident investigation and threat hunting
Experience in conducting investigations and identifying malicious activities using techniques such as packet analysis, log analysis, and endpoint forensics
Nice to have:
Microsoft Security certifications such as MCSE: Security, MCSA: Windows Server 2016, Azure Security Engineer Associate are a plus
Welcome to CrawlJobs.com – Your Global Job Discovery Platform
At CrawlJobs.com, we simplify finding your next career opportunity by bringing job listings directly to you from all corners of the web. Using cutting-edge AI and web-crawling technologies, we gather and curate job offers from various sources across the globe, ensuring you have access to the most up-to-date job listings in one place.
We use cookies to enhance your experience, analyze traffic, and serve personalized content. By clicking “Accept”, you agree to the use of cookies.