CSOC Level 2 Analyst | Codersbrain
full-time
Posted on August 2, 2025
Job Description
CSOC Level 2 Analyst
Company Overview
Not specified
Job Summary
The CSOC Level 2 Analyst plays a critical role in safeguarding the organization's digital assets through advanced incident response activities, comprehensive log analysis, and detailed incident reporting. This position is integral to maintaining security posture and enhancing incident detection capabilities.
Responsibilities
- Conduct advanced incident response activities to swiftly address cybersecurity threats and breaches.
- Analyze logs comprehensively to identify suspicious activities, potential threats, and security incidents.
- Provide detailed incident reporting, documenting observations and findings to inform future preventative measures.
- Utilize security tools and technologies to enhance the efficiency of incident response within the Security Operations Center (SOC).
- Collaborate with other internal security teams and the Cyber Incident Response (CIR) Service for effective incident management.
- Maintain and manage the SOC Knowledgebase, including playbooks, processes, and contacts.
Qualifications
- Experience: 5-8 years in a cybersecurity role, particularly in a Security Operations Center (SOC).
- Technical Skills:
- Proficient in Malware Analysis and Threat Hunting.
- Familiar with tools such as THOR Scanner, VMRay, and Recorded Future Sandbox.
- Knowledge of Microsoft Security Products, including MS Defender for Endpoint, Cloud, Identity, AV, and MS Sentinel.
- Understanding of Application, Cloud, and Infrastructure security, including Firewalls, Proxies, and Web Application Firewalls (WAF).
- Expertise in using SIEM (Security Information and Event Management) systems and IDS/IPS (Intrusion Detection/Prevention Systems).
- Soft Skills:
- Strong analytical skills to interpret complex datasets and identify patterns indicative of security threats.
- Excellent communication skills for sharing technical feedback and collaborating with team members.
Preferred Skills
- Experience in documenting and analyzing incident timelines and events.
- Ability to analyze email logs to trace phishing attacks and spoofed messages.
- Skilled in refining and tuning alerting systems based on insights from incident investigations.
Experience
- 5-8 years in a cybersecurity role, with substantial experience in SOC environments.
Environment
- Must be willing to provide support and work flexible 24/7 rotational shifts, including weekends.
Salary
Not specified
Growth Opportunities
Not specified
Benefits
Not specified