L2 SOC Analyst

·
Full time
Location: York
·
Job offered by: Leap29
·
Category:
Job Title:

L2 SOC Analyst

Location:

Hybrid Worker (3 days office based) - York

Focus Areas:

Microsoft Sentinel, XDR, SIEM, SOAR, Vulnerability Management

Key Responsibilities:

Security Monitoring and Incident Response:

Continuously monitor and investigate security events in Microsoft Sentinel and other SIEM/XDR platforms. Triage, analyze, and respond to security incidents (L2 escalations) involving malware, phishing, unauthorized access, data exfiltration, etc. Collaborate with L1 SOC Analysts to support escalations and provide guidance on more complex incidents. Use SOAR (Security Orchestration, Automation, and Response) playbooks for automated response and containment.

Threat Intelligence and Threat Hunting:

Conduct proactive threat hunting within customer environments using SIEM, XDR, and threat intelligence feeds. Analyze advanced persistent threats (APTs), malicious campaigns, and other cyber threats using threat intelligence.

Vulnerability Management:

Analyze vulnerability scans and assess the security posture of customer environments. Collaborate with customers' IT teams to prioritize and remediate critical vulnerabilities. Monitor and ensure patch management cycles are completed successfully.

Security Orchestration (SOAR) and Automation:

Create and maintain SOAR workflows to automate incident response actions like blocking IPs, isolating systems, and notifying stakeholders. Evaluate the effectiveness of SOAR playbooks and recommend improvements for better automation of routine tasks.

Platform Administration and Optimization:

Manage and fine-tune Microsoft Sentinel, XDR, SIEM, and SOAR platforms to ensure optimal performance and log ingestion. Maintain up-to-date security content such as detection rules, analytics queries, correlation rules, and response playbooks.

Reporting and Compliance:

Generate security reports, including incident summaries, threat intelligence, and vulnerability reports, for internal and client-facing purposes. Ensure compliance with security frameworks such as ISO 27001, NIST, GDPR, and industry-specific standards relevant to clients.

Required Skills and Qualifications:

Technical Expertise:

Strong experience with Microsoft Sentinel and other SIEM platforms (Splunk, QRadar, etc.). Familiarity with Extended Detection and Response (XDR) platforms (Defender, Trend Micro, etc.). Strong knowledge of Vulnerability Management tools (Tenable, Qualys, etc.) and processes. Proficiency with scripting languages (PowerShell, Python, KQL) for automation and threat hunting.

Security Fundamentals:

Strong knowledge of network security, firewalls, IDS/IPS, endpoint protection, and DLP solutions. Experience with incident response, malware analysis, forensics, and intrusion detection techniques. Familiarity with MITRE ATT&CK framework and TTP (Tactics, Techniques, and Procedures) of threat actors.

Problem Solving and Analytical Thinking:

Ability to analyze and interpret security events, logs, and incident data. Proficiency in building detection rules, analytics queries (KQL, SQL), and customizing SIEM dashboards.

Communication and Collaboration:

Strong communication skills for interfacing with clients, internal teams, and stakeholders. Ability to provide detailed incident reports and make security recommendations to improve security posture.

Certifications (Preferred but not mandatory):

Microsoft Certified: Security Operations Analyst Associate

CompTIA Security+

Certified SOC Analyst (CSA)

GIAC Certified Incident Handler (GCIH) or similar

Familiarity with frameworks such as CIS, NIST CSF, ISO 27001, or SOC 2

Experience: 2-4 years of SOC experience, preferably in a Managed Security Services Provider (MSSP) or Managed Service Provider (MSP) environment. Previous experience working with enterprise-level clients on security monitoring, incident response, and vulnerability management.

Soft Skills: Strong teamwork and collaboration in fast-paced environments. Ability to work under pressure and handle multiple incidents simultaneously. Eagerness to learn and keep up with evolving security threats and technologies.

#J-18808-Ljbffr

Recent Jobs

London (On site) · Full time

Are you a smart, driven professional who takes pride in making a difference in local communities? Turner & Townsend’s Real Estate division is experiencing significant growth and we’re looking for an experienced industry professional with health project experience to join our high-performing and collaborative Project Management team. Why Join Us? Impactful Work: Contribute to social [...]Read More... from Assistant Project Manager – Healthcare See details

Chasetown (On site) · Full time

My client, Autosmart International are a manufacturing success story! Site Operations Manager – leading fast-paced manufacturing and warehousing About Our Client Autosmart International is a manufacturing success story, leading the field in vehicle cleaning products. We are the No.1 choice of automotive trade customers across the UK. We have doubled in size in the last [...]Read More... from Site Operations Manager See details

London (On site) · Full time

CSS are looking for an experienced duty officer to join our client’s team who are a local council responsible for all areas within the Tendering district. Working hours: All shifts are 8 hours long with various start times available: Monday to Friday – start times between 6AM – 3PM Saturday & Sunday – 6AM – [...]Read More... from Duty Officer See details