Job Description

Job Description:As a Level 2 SOC Analyst, you will lead threat detection, investigation, and incident response efforts using tools like Sentinel and Defender. You’ll mentor L1 analysts, refine security rules, and contribute to the ongoing evolution of cybersecurity frameworks, making an impact in both day-to-day operations and long-term strategy.Responsibilities:Lead security incident investigations and response Analyze alerts from Microsoft Sentinel, Defender, firewalls, and other security tools Tune SIEM rules and maintain incident response playbooks Mentor L1 analysts and coordinate with the MSP/NOC teams Document findings, trends, and threat intelligenceRequirements: Microsoft Sentinel: analytic rules, custom detections, alert tuning Microsoft Defender: threat detection and incident response Incident handling, investigation, and documentation Playbook automation and Logic Apps for incident response workflows Experience with Microsoft Security Copilot is a plus

Job Application Tips

  • Tailor your resume to highlight relevant experience for this position
  • Write a compelling cover letter that addresses the specific requirements
  • Research the company culture and values before applying
  • Prepare examples of your work that demonstrate your skills
  • Follow up on your application after a reasonable time period

You May Also Be Interested In