CrawlJobs Logo

SOC Analyst (Level 2)

keyrock.com Logo

Keyrock

Location Icon

Location:
United States; Spain; Belgium; United Kingdom; France; Poland; Italy; Netherlands; Germany; Portugal; Ireland , Remote

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

As a SOC Analyst (Level 2), you are the escalation point for complex investigations and active incidents. You’ll take ownership of high-severity alerts, lead technical triage through containment, and coordinate with Incident Response, Cloud/Platform, Identity, and Engineering teams. You’ll also improve SOC quality by tuning detections, refining playbooks, mentoring Level 1 analysts, and driving post-incident learnings into better controls.

Job Responsibility:

  • Advanced detection and investigation
  • Incident response and containment
  • Threat intelligence and adversary tradecraft
  • Detection engineering and SOC improvement
  • Operational leadership

Requirements:

  • 2–5+ years of SOC / incident response / security operations experience (or equivalent hands-on experience in a fast-paced production environment)
  • Strong ability to investigate across cloud security operations, endpoint security, identity, and core network fundamentals
  • Proficiency with at least one SIEM and common SOC tooling (e.g., Splunk/Elastic/Sentinel
  • CrowdStrike/Defender
  • Jira/ServiceNow)
  • Ability to write clear incident documentation: timelines, scope, impact, containment actions, and recommended remediations
  • Comfort operating in an on-call or shift environment (depending on coverage model)

Nice to have:

  • Detection engineering experience: correlation rules, Sigma/KQL/SPL, alert pipelines, SOAR automation
  • DFIR fundamentals: triage acquisition, volatile vs. non-volatile evidence, endpoint artifact analysis
  • Container/Kubernetes logging and runtime security exposure
  • Practical scripting (Python/Bash) for analysis and automation
  • Digital-asset ecosystem exposure and 24/7 trading operations familiarity
  • Certifications (optional): GCIH, GCIA, GCED, SC-200, AWS Security Specialty, or equivalent

Additional Information:

Job Posted:
February 18, 2026

Employment Type:
Fulltime
Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for SOC Analyst (Level 2)

SOC Analyst – Intermediate

Under the general direction of the management team and senior staff, Security Op...
Location
Location
United States
Salary
Salary:
Not provided
revelit.com Logo
Revel IT
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Typically has a 4-year academic degree and 2+ years of information security or equivalent practical work experience
  • Demonstrates and applies thorough understanding of information technology tools, best practices, and concepts
  • Completes on-going training on-the-job, through courses, self-study, certifications and/or advanced degrees to maintain and enhance technical and business capabilities
  • Maintains current knowledge of security techniques and technologies and applies that knowledge to mitigate risk
  • Participates in an On-Call Team rotation
  • Previous experience with some of the following security technologies: Security information and event management (SIEM), Endpoint Detection and Response (EDR), Anti-Virus, IDS/IPS, and NGFW solutions
  • Knowledge of tactics attackers are using while continuing to monitor for new tactics and procedures being utilized
Job Responsibility
Job Responsibility
  • Provide service to IT client community, patients, families and visitors, while protecting the integrity and confidentiality of all data and information through physical and electronic measures
  • Monitor and investigate security alerts to detect malicious activity that originate from the SIEM, NGFW, EDR, NGAV, etc
  • Follow incident specific playbooks and procedures documented by SOC leadership while investigating and responding to malicious activity
  • Maintain accurate notes in the case management system
  • Proactively identify and remediate threats occurring in the environment by demonstrating the ability to hunt in SIEM and EDR solutions
  • Provide on-call support at designated times in accordance with the policies and procedures of the Health System
  • Collaborate with the team and answer any questions that other analysts may have
  • Assist in the training of new team members
  • Assist in investigating alerts escalated by associate level staff members
  • Work independently to investigate security incidents and alerts
  • Fulltime
Read More
Arrow Right

L3 Security Analyst

Join Vodafone’s Cyber Defence Operations Center of Excellence (CDO) and play a p...
Location
Location
United Kingdom , Newbury
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experienced SOC analyst (Level 2 or above) with at least 4 years in security event analysis and incident response
  • Strong technical knowledge of networking protocols, operating systems (Windows/Linux), and security technologies (SIEM, EDR, IDS/IPS, firewalls, proxies)
  • Hands-on experience with SIEM tuning and SOAR automation
  • Familiarity with frameworks like MITRE ATT&CK and cyber kill chain
  • Knowledge of cloud platforms (Azure, AWS, Google Cloud) and scripting/programming skills
  • Excellent analytical, communication, and collaboration skills, with the ability to explain technical concepts to non-technical audiences
  • Passion for continuous learning and professional development, ideally working toward certifications such as GCIA, GCIH, GCFA, GNFA, CEH, or ECSA
  • A proactive, disciplined approach and the ability to work independently or as part of a team in a fast-paced environment
Job Responsibility
Job Responsibility
  • Investigate and validate threats using cutting-edge tools
  • Collaborate with global teams on incident investigations
  • Mentor colleagues to uplift skills across the CSOC
  • Fine-tuning SIEM systems and automating response actions
  • Delivering insightful security reports and advisories
What we offer
What we offer
  • Yearly bonus: 10%
  • Annual leave: 28 days + bank holidays + the opportunity to buy/sell/carry over 5 days/year
  • Charity days: 5 days/year
  • Maternity leave: 52 weeks: the first 13 weeks are fully paid, followed by 26 weeks of half pay
  • Private pension: You can contribute up to 5% of your basic pay with 2:1 matching from Vodafone up to 10%
  • Access to: private medical, private dental, free health assessments, share save scheme
  • Additional discounts: Vodafone retail, gym, cinema, cycle to work, season ticket loan
Read More
Arrow Right
New

Incident Response Analyst

In order to support our international Incident Response Team, Airbus Defense and...
Location
Location
Spain , Getafe
Salary
Salary:
Not provided
airbus.com Logo
Airbus
Expiration Date
April 15, 2026
Flip Icon
Requirements
Requirements
  • Educated to degree level in Cyber security, computer science or relevant working experience
  • Certifications of GIAC or comparable
  • Experience and knowledge in the following items are welcome: perform reverse-engineering, Hosts forensic analysis
  • Negotiation level in English
  • This position will require a security clearance or will require being eligible for clearance by the recognized authorities
Job Responsibility
Job Responsibility
  • Investigation of SOC alerts and security incidents
  • Improvement of the threat detection and response capabilities
  • Support the SOC in its daily operations
  • Support incident response in crisis mode: Be part of the on-call crisis team (deployment reactivity constraints)
  • Perform reverse-engineering
  • Hosts forensic analysis
  • Contribute to the industrialization of: Security Tooling
  • Network analysis
  • Host analysis
  • Detection: Use Case development and alerts
What we offer
What we offer
  • Vacation days and additional days-off along the year (+35 days off in total)
  • Attractive salary and compensation package
  • Hybrid model of working when possible, promoting the work-life balance (40% remote work)
  • Collective transport service in some sites
  • Benefits such as health insurance, employee stock options, retirement plan...
  • On-site facilities (among others): free canteen, kindergarten, medical office
  • Possibility to collaborate in different social and corporate social responsibility initiatives
  • Excellent upskilling opportunities and great development prospects in a multicultural environment
  • Special rates in products & benefits
  • Fulltime
Read More
Arrow Right
New

SOC Analyst (Level 1)

As a SOC Analyst (Level 1), you are the first line of defense for monitoring, tr...
Location
Location
Salary
Salary:
Not provided
keyrock.com Logo
Keyrock
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 0–2 years in a SOC / security monitoring / IT operations role (or equivalent hands-on experience, internships, labs)
  • Practical knowledge of security fundamentals: networking, DNS, HTTP(S), identity/authentication, and malware basics
  • Familiarity with log investigation and event triage concepts
  • Familiarity with common security tools and workflows (any of the following): SIEM (Splunk/Elastic/Sentinel), EDR (CrowdStrike/Defender), ticketing (Jira/ServiceNow), basic SOAR concepts
  • Strong written communication: produce clear, escalation-ready tickets and timelines
  • Ability to work rotating shifts/on-call (as required), including weekends/holidays depending on coverage model
Job Responsibility
Job Responsibility
  • 24/7 monitoring and alert triage across SIEM/EDR/cloud security tooling
  • identify false positives vs. credible threats and set appropriate severity
  • Initial investigation and enrichment: gather relevant logs/telemetry, add context, and document findings clearly in the case/ticketing system
  • Escalation and coordination: escalate confirmed/suspected incidents quickly and cleanly to L2/IR with a complete handoff (timeline, scope, IOCs, actions taken)
  • Runbook execution: follow SOPs for common events (phishing, suspicious logins, endpoint detections, cloud key/token risk, malware alerts, data exfiltration signals), including containment actions you’re authorized to perform
  • Threat-aware analysis: map alerts to adversary behaviors (e.g., MITRE ATT&CK techniques) to improve understanding and escalation quality
  • Operational hygiene: maintain accurate shift handovers, update watchlists and investigation notes, and identify recurring alert patterns for tuning recommendations
What we offer
What we offer
  • Work in a fast-moving, globally distributed environment shaping the future of digital financial markets
  • A culture that expects ownership, learning, and continuous improvement
  • Fulltime
Read More
Arrow Right
New

Director of Physical Security & Compliance

Crusoe is expanding our hyper-scale AI and high-performance computing (HPC) data...
Location
Location
United States , San Francisco
Salary
Salary:
225000.00 - 280000.00 USD / Year
crusoe.ai Logo
Crusoe
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 10+ years in physical security or mission-critical infrastructure
  • Deep knowledge of operating physical security technologies and system design
  • Experience with in a high-availability environment
  • Experience implementing controls for SOC 2, ISO, NIST, and similar frameworks
  • Proven ability to manage multi-site security operations and compliance programs
  • Strong incident management and risk assessment background
  • Experience designing or scaling enterprise security systems across multi-site environments
  • Strong understanding of SOC 2, ISO 27001, NIST, and related frameworks
  • Background managing guard operations, access control, and incident response
  • Ability to lead programs from zero-to-one and influence senior stakeholders
Job Responsibility
Job Responsibility
  • Operationalize the global physical security strategy, and ensure data center alignment with enterprise security standards, and policies
  • Implement the security risk framework within Data Center Facility Operations
  • Translate enterprise security requirements into site-specific designs for new campuses
  • Conduct site-level security risk and threat assessments
  • Establish a scalable security operations model for 50–400 MW hyper-scale facilities
  • Own the operational lifecycle of dedicated physical security systems (ACS, VSS, IDS)
  • Execute site-level operational controls to ensure adherence to compliance programs for SOC 2, ISO 27001/27002, NIST 800-53, and other regulations
  • Maintain operational documentation, logs, and evidence of adherence to established internal controls
  • Maintain year-round audit readiness for physical access to cages, racks, and on-site office rooms
  • Ensure operational availability, resiliency, and scalability of security infrastructure
What we offer
What we offer
  • Restricted Stock Units in a fast growing, well-funded technology company
  • Health insurance package options that include HDHP and PPO, vision, and dental for you and your dependents
  • Employer contributions to HSA accounts
  • Paid Parental Leave
  • Paid life insurance, short-term and long-term disability
  • Teladoc
  • 401(k) with a 100% match up to 4% of salary
  • Generous paid time off and holiday schedule
  • Cell phone reimbursement
  • Tuition reimbursement
  • Fulltime
Read More
Arrow Right

SOC Analyst Senior Cyber Security Engineer

Position: SOC Analyst Senior Cyber Security Engineer. Experience: 2 to 4 yrs. Lo...
Location
Location
India , Noida
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 2-year experience working in security operations environment or 2 years’ experience in IT operations Data Centre, SOC/NOC
  • Very good English verbal & written communication skills
  • Good understanding of networking concepts and operating systems
  • Good understanding of key customer infrastructure components - Proxy, Firewall, Antivirus
  • Technical capability and maturity to assist and guide the team of Analysts
  • Should have worked and have good understanding of the following security tools: (SentinelOne IR, Service Now Tool, Microsoft Defender)
  • Ability to learn new skills and adopting new technologies and work collaboratively in an international context
  • Capability to understand and work in a complex environment and concern for quality and detail
  • Ability to synthesize and analyze a variety of contexts and manage customer confidentiality
  • Knowledge on ITIL basic practice
Job Responsibility
Job Responsibility
  • Ensure all threats at customer environment are detected and notified in timely manner
  • Continuous review of Incidents to ensure compliance with standard operating procedures
  • Provide training and feedback to Security Analysts to ensure high quality deliverables
  • Identify and execute continuous improvements in monitoring including threat scenarios and operating procedures
  • Interact with customers on queries and improvements related to service deliverables
  • Should know and able to contribute to MSSP services (Managed Security Services Provider)
  • Perform root cause analysis for any errors /deficiencies pointed out in the monitoring service
  • Review the alert to determine relevancy and urgency, create new trouble tickets for incident
  • Ensure thorough knowledge of Protection of Personal Identifiable Information and GDPR
Read More
Arrow Right

Detection & Response Analyst

We are looking for people with a passion for investigation and forensic analysis...
Location
Location
Czechia , Prague
Salary
Salary:
Not provided
rapid7.com Logo
Rapid7
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Knowledge of Windows, Linux operating systems
  • 2-5 years of experience as a SOC or DFIR or Incident Response Analyst
  • Knowledge of security concepts (lateral movement, privilege escalation, persistence methods, command and control, exfiltration, etc.)
  • Security Certifications (GFACT, GSEC, GCIA, GCIH, CySA+, CASP+, Security+, etc.)
  • Scripting/coding ability
  • Willingness to work on a shift schedule - The Rapid7 MDR SOC has a shift rotation which requires analysts to work a 4:3 schedule from 8 AM - 6 PM after a 90 day onboarding and training period. The shifts are from Sunday-Wednesday and Wednesday-Saturday.
  • Excited by technology with a passion for cybersecurity, curious and eager to learn and develop in a security role
  • Demonstrates a strong sense of responsibility for protecting customer trust, making decisions that prioritize security and impact
  • A collaborative team player who has the ability to partner successfully with others to drive impact
  • Demonstrates a strong sense of ownership, holding themself and others accountable to achieving outcomes that deliver value to our customers and internal teams
Job Responsibility
Job Responsibility
  • Review alert data to identify malicious activity in customer environments
  • Steer investigations, which includes everything from evidence acquisition and analysis to figuring out how the intrusion began to identify any malicious or unexpected activity related to the event
  • Write a Findings Report which includes your technical analysis, documented findings, and remediation recommendations for customers
  • Deliver world-class threat detection services using traditional threat intelligence-based detection and user behavior analytics
  • Conduct or assist with Rapid7 incident response investigations
  • Assist in capturing and deploying knowledge of attack methodologies
  • Provide continuous input to Rapid7 product development teams
  • On a monthly basis you will perform threat hunting to identify unknown threats in a customer environment
  • In the event of a security incident that rises to the level of a Remote Incident Response engagement, you may be tasked with performing investigation tasks related to the investigation
  • Partner cross functionally with a Customer Advisor who will be responsible for direct communication with our customers
Read More
Arrow Right

Security Governance Risk & Compliance (GRC) Analyst

Here at Virtru you’ll help build a cutting edge security compliance program alig...
Location
Location
United States , Washington, DC
Salary
Salary:
130000.00 - 180000.00 USD / Year
virtru.com Logo
Virtru
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of 5+ years of information security, IT audit and/or IT Risk Management, or GRC Analyst/Engineer experience
  • Deep understanding of at least few of the following: CMMC, NIST 800-53 & 800-171, FedRAMP, SOC 2, PCI, and/or other global privacy compliance frameworks
  • Technical acumen. Strong understanding of modern cloud technologies (AWS, GCP, Azure, etc.) and familiarity with GRC tools (Hyperproof, Vanta, Drata, etc) and SIEM tools (Datadog, Splunk)
  • You’re a relationship builder and have worked with both business and technical risk and understand how to translate risk to various levels of the organization
  • Have experience training and coaching teams to become better security and privacy practitioners
  • Like working on an autonomous agile team
  • Ability to resolve conflicts and drive issues to completion
  • Work independently with little or no supervision while maintaining a high level of efficiency
  • Hands on experience deploying and managing vulnerability scanning/cloud security posture management tools (Wiz, Prismacloud, etc.) to meet security compliance requirements
  • Real-world IR experience participating on security On-Call teams
Job Responsibility
Job Responsibility
  • Manage and implement complex controls frameworks for large systems, consisting of Cloud infrastructure and Software as a Service (SaaS) services (GCP, AWS, GitHub, Okta, etc)
  • Design and develop automation solutions for evidence collection across Cloud infrastructure, endpoints, and SaaS services
  • Conduct risk assessments across business units and processes. Identify risk findings and recommend remediation and risk mitigation strategies
  • Assist or implement automated controls to support risk mitigation efforts across various business units with stakeholders
  • Incorporate CMMC certification into Virtru’s slate of compliance assessments and ongoing monitoring activities (FedRAMP, SOC 2, PCI)
  • Facilitate the third-party vendor on-boarding and annual review process by evaluating the security of current and prospective partners
  • Participate in incident response (IR) activities, providing risk analysis and remediation support as needed
  • Enhance the team with your individualism, spirit, and love of learning
What we offer
What we offer
  • A Flexible PTO policy
  • A $1,500 annual Learning & Development Stipend
  • Frequent company-sponsored team celebrations
  • Access to an Employee Assistance Program
  • Access to Headspace, a mental health app
  • A flat 3% contribution to your retirement account
  • A high degree of flexibility
  • Competitive compensation
  • Generous parental, medical, and bereavement policies
  • 401K contribution and stock options
  • Fulltime
Read More
Arrow Right