This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
As a SOC Analyst (Level 2), you are the escalation point for complex investigations and active incidents. You’ll take ownership of high-severity alerts, lead technical triage through containment, and coordinate with Incident Response, Cloud/Platform, Identity, and Engineering teams. You’ll also improve SOC quality by tuning detections, refining playbooks, mentoring Level 1 analysts, and driving post-incident learnings into better controls.
Job Responsibility:
Advanced detection and investigation
Incident response and containment
Threat intelligence and adversary tradecraft
Detection engineering and SOC improvement
Operational leadership
Requirements:
2–5+ years of SOC / incident response / security operations experience (or equivalent hands-on experience in a fast-paced production environment)
Strong ability to investigate across cloud security operations, endpoint security, identity, and core network fundamentals
Proficiency with at least one SIEM and common SOC tooling (e.g., Splunk/Elastic/Sentinel
CrowdStrike/Defender
Jira/ServiceNow)
Ability to write clear incident documentation: timelines, scope, impact, containment actions, and recommended remediations
Comfort operating in an on-call or shift environment (depending on coverage model)