Location: Baku
Job Type: Full-time
Experience Level: Mid-level
Languages Required: Azerbaijani (required), English (required)
About the Role
We are looking for a skilled and experienced SOC Level 2 Analyst to join growing cybersecurity team. In this role, you will play a critical part in advanced threat detection, investigation, and incident response within our 24/7 Security Operations Center. You’ll lead the analysis of escalated alerts, conduct in-depth investigations, and support L1 analysts, while continuously working to enhance our threat detection and response capabilities.
Key Responsibilities
Threat Monitoring & Analysis
- Analyze and investigate escalated alerts from SOC L1 analysts.
- Perform deep-dive investigations using SIEM, EDR, and other security tools.
- Correlate log and network data from multiple sources to identify threat patterns.
- Conduct malware analysis, forensic investigations, and log analysis.
Incident Response & Threat Mitigation
- Lead response efforts for complex and high-priority security incidents.
- Contain, eradicate, and support recovery from cybersecurity breaches.
- Document incident findings and participate in post-incident reviews.
- Recommend improvements to strengthen the security posture of the organization.
Threat Intelligence & Detection Enhancement
- Utilize threat intelligence feeds to stay ahead of emerging threats.
- Assist with tuning SIEM rules, IDS/IPS signatures, and detection logic.
- Collaborate with L3 analysts and engineers to refine detection strategies.
Security Tools & Process Optimization
- Manage and optimize SOC tools (SIEM, EDR, firewall logs, scanners).
- Participate in threat hunting activities to proactively uncover threats.
- Develop and update detection playbooks, workflows, and use cases.
Mentorship & Team Development
- Mentor and support L1 analysts in managing security incidents.
- Lead knowledge-sharing sessions and contribute to ongoing training.
- Keep abreast of the latest cybersecurity trends, tools, and attack techniques.
Qualifications & Requirements
Education:
- Bachelor’s or Master’s degree in Computer Science, Cybersecurity, IT, or a related field.
Experience:
- Minimum 3 years of hands-on experience in cybersecurity.
- At least 1 year of experience in a SOC, pre-sales engineering, or cybersecurity engineering role.
Technical Skills:
- Strong knowledge and experience with SIEM platforms (e.g., Splunk, IBM QRadar, ArcSight).
- Proficiency with EDR/XDR platforms (e.g., CrowdStrike, SentinelOne).
- Ability to analyze network traffic, logs, and malware behavior.
- Experience with firewalls, IDS/IPS, and vulnerability scanners.
- Familiarity with security frameworks: MITRE ATT&CK, NIST, ISO 27001.
- Scripting knowledge in Python, PowerShell, or Bash is a plus.
Preferred Certifications
- International certifications from cybersecurity leaders such as:
- Fortinet NSE, CyberArk, Splunk, CompTIA Security+/CySA+, Forcepoint, etc.
Core Competencies
- Analytical and problem-solving skills
- Attention to detail and ability to work under pressure
- Effective communication and collaboration
- Time management and multitasking capabilities
- Strong work ethic and a proactive mindset
Ready to take your cybersecurity career to the next level?
Apply now to be part of a team that’s shaping the future of digital defense.
Please send your CV to [email protected] and do not forget to mention your salary expectation.