HumanBit Logo

CSOC Level 2 Analyst | Codersbrain

full-time
Posted on August 2, 2025

Job Description

CSOC Level 2 Analyst

Company Overview

Not specified

Job Summary

The CSOC Level 2 Analyst plays a critical role in safeguarding the organization's digital assets through advanced incident response activities, comprehensive log analysis, and detailed incident reporting. This position is integral to maintaining security posture and enhancing incident detection capabilities.

Responsibilities

  • Conduct advanced incident response activities to swiftly address cybersecurity threats and breaches.
  • Analyze logs comprehensively to identify suspicious activities, potential threats, and security incidents.
  • Provide detailed incident reporting, documenting observations and findings to inform future preventative measures.
  • Utilize security tools and technologies to enhance the efficiency of incident response within the Security Operations Center (SOC).
  • Collaborate with other internal security teams and the Cyber Incident Response (CIR) Service for effective incident management.
  • Maintain and manage the SOC Knowledgebase, including playbooks, processes, and contacts.

Qualifications

  • Experience: 5-8 years in a cybersecurity role, particularly in a Security Operations Center (SOC).
  • Technical Skills:
    • Proficient in Malware Analysis and Threat Hunting.
    • Familiar with tools such as THOR Scanner, VMRay, and Recorded Future Sandbox.
    • Knowledge of Microsoft Security Products, including MS Defender for Endpoint, Cloud, Identity, AV, and MS Sentinel.
    • Understanding of Application, Cloud, and Infrastructure security, including Firewalls, Proxies, and Web Application Firewalls (WAF).
    • Expertise in using SIEM (Security Information and Event Management) systems and IDS/IPS (Intrusion Detection/Prevention Systems).
  • Soft Skills:
    • Strong analytical skills to interpret complex datasets and identify patterns indicative of security threats.
    • Excellent communication skills for sharing technical feedback and collaborating with team members.

Preferred Skills

  • Experience in documenting and analyzing incident timelines and events.
  • Ability to analyze email logs to trace phishing attacks and spoofed messages.
  • Skilled in refining and tuning alerting systems based on insights from incident investigations.

Experience

  • 5-8 years in a cybersecurity role, with substantial experience in SOC environments.

Environment

  • Must be willing to provide support and work flexible 24/7 rotational shifts, including weekends.

Salary

Not specified

Growth Opportunities

Not specified

Benefits

Not specified

Powered by
HumanBit Logo