Level 2 SOC Analyst
Well known brand require a Level 2 SOC Analyst to join their Security Operations Team, who will be responsible for the management, response and/or escalation of security incidents received from Level 1 SOC Analysts.
This role is Hybrid working, you will be required to travel to the office in Amsterdam 2 days a week.
The L2 SOC Analyst will have the following experience:
Vulnerability Scanning, responding to alerts through to resolution
Performing analysis in reviewing security alerts, triaging
EDR Tools e.g. Carbon Black, Crowdstrike
SIEM Tools e.g. Splunk, IBM, LogRhythm, Sentinel, Qradar, Alien Vault, Solarwind SEM, Quadrant, Kibana (Elastic Search, using KQL for log analysis)
Networking Monitoring Tools
Worked in an internal SOC Managing Incidents
Worked as a SOC Analyst within a complex large scale business
IDS/IPS, Firewalls, Anti-virus, active directory, DLP, proxies, and honeypots using SIEMs tools
If you're interested, please apply to the advert or contact me at email@example.com