Cyber Security Analyst (SOC Tier 2)Shift Pattern - 24/7 coverage 4 days on 4 days offCompetitive salary with a 30% shift allowance and excellent benefits. Our client is seeking Tier 2 Cyber Security Analyst to join their Cyber Threat Analysis Centre (CTAC). This role is vital in advancing threat investigations, triaging escalated incidents, and mentoring Tier 1 Analysts. The Tier 2 Analyst bridges foundational and advanced threat detection, ensuring efficient SOC operations.Key Responsibilities:
- Advanced Threat Analysis: Investigate and triage escalated security incidents, determining severity and response actions.
- SIEM & Log Analysis: Utilize Kusto Query Language (KQL) and SIEM platforms for event correlation and documentation.
- Incident Escalation: Identify and escalate critical threats to Tier 3 Analysts for further action.
- Threat Intelligence: Leverage OSINT techniques to enhance detection and improve situational awareness.
- Detection & Response: Collaborate with Tier 3 Analysts to refine detection rules, tune SIEM tools, and minimize false positives.
- Process Improvement: Contribute to refining incident response playbooks and detection workflows.
- Mentorship & Training: Guide and support Tier 1 Analysts, enhancing their technical skills and efficiency.
Skills & Experience:
- Strong understanding of networking concepts, IP protocols, and traffic analysis.
- Advanced knowledge of Windows & Linux environments.
- Expertise in SIEM tools (e.g., ArcSight, Azure Sentinel) and KQL for log analysis.
- Familiarity with OSINT techniques for enhanced threat intelligence.
- Excellent communication skills, with the ability to explain technical issues clearly.
- Ability to work under pressure and manage workloads effectively.
- Proactive in learning new technologies and collaborating within the SOC.
This is a great opportunity for cybersecurity professionals eager to grow in threat detection and response while contributing to a high-performing SOC team. Apply today!