[email protected]
SOC L2 Analyst

Location: Baku
Job Type: Full-time
Experience Level: Mid-level
Languages Required: Azerbaijani (required), English (required)

About the Role

We are looking for a skilled and experienced SOC Level 2 Analyst to join growing cybersecurity team. In this role, you will play a critical part in advanced threat detection, investigation, and incident response within our 24/7 Security Operations Center. You’ll lead the analysis of escalated alerts, conduct in-depth investigations, and support L1 analysts, while continuously working to enhance our threat detection and response capabilities.

Key Responsibilities

Threat Monitoring & Analysis

  • Analyze and investigate escalated alerts from SOC L1 analysts.
  • Perform deep-dive investigations using SIEM, EDR, and other security tools.
  • Correlate log and network data from multiple sources to identify threat patterns.
  • Conduct malware analysis, forensic investigations, and log analysis.

Incident Response & Threat Mitigation

  • Lead response efforts for complex and high-priority security incidents.
  • Contain, eradicate, and support recovery from cybersecurity breaches.
  • Document incident findings and participate in post-incident reviews.
  • Recommend improvements to strengthen the security posture of the organization.

Threat Intelligence & Detection Enhancement

  • Utilize threat intelligence feeds to stay ahead of emerging threats.
  • Assist with tuning SIEM rules, IDS/IPS signatures, and detection logic.
  • Collaborate with L3 analysts and engineers to refine detection strategies.

Security Tools & Process Optimization

  • Manage and optimize SOC tools (SIEM, EDR, firewall logs, scanners).
  • Participate in threat hunting activities to proactively uncover threats.
  • Develop and update detection playbooks, workflows, and use cases.

Mentorship & Team Development

  • Mentor and support L1 analysts in managing security incidents.
  • Lead knowledge-sharing sessions and contribute to ongoing training.
  • Keep abreast of the latest cybersecurity trends, tools, and attack techniques.

Qualifications & Requirements

Education:

  • Bachelor’s or Master’s degree in Computer Science, Cybersecurity, IT, or a related field.

Experience:

  • Minimum 3 years of hands-on experience in cybersecurity.
  • At least 1 year of experience in a SOC, pre-sales engineering, or cybersecurity engineering role.

Technical Skills:

  • Strong knowledge and experience with SIEM platforms (e.g., Splunk, IBM QRadar, ArcSight).
  • Proficiency with EDR/XDR platforms (e.g., CrowdStrike, SentinelOne).
  • Ability to analyze network traffic, logs, and malware behavior.
  • Experience with firewalls, IDS/IPS, and vulnerability scanners.
  • Familiarity with security frameworks: MITRE ATT&CK, NIST, ISO 27001.
  • Scripting knowledge in Python, PowerShell, or Bash is a plus.

Preferred Certifications

  • International certifications from cybersecurity leaders such as:
    • Fortinet NSE, CyberArk, Splunk, CompTIA Security+/CySA+, Forcepoint, etc.

Core Competencies

  • Analytical and problem-solving skills
  • Attention to detail and ability to work under pressure
  • Effective communication and collaboration
  • Time management and multitasking capabilities
  • Strong work ethic and a proactive mindset

Ready to take your cybersecurity career to the next level?
Apply now to be part of a team that’s shaping the future of digital defense.

Please send your CV to [email protected] and do not forget to mention your salary expectation.

Konsultasiya
Göndərildi
Təşəkkür edirik. Mesajınız uğurla göndərildi. Mütəxəssislərimiz tezliklə sizinlə əlaqə saxlayacaq.