Welcome to Newstore09.sarkarivaccancy.com
We provide job seekers with information gathered from various publicly available job posting websites, including but not limited to Google, Indeed, LinkedIn, and other well-known job platforms. Our mission is to help individuals find employment opportunities by offering up-to-date job listings and career-related resources. We do not charge any fees for accessing or using our website, and all job information is provided free of charge.
Newstore09.sarkarivaccancy.com does not directly offer, manage, or engage in the hiring process for any of the job listings featured on our website. All listings are sourced from third-party job posting platforms such as Indeed, LinkedIn, and other recognized job websites.
By using our website, you acknowledge and accept the above terms and conditions. Thank you for visiting Newstore09.sarkarivaccancy.com, and we wish you success in your job search.
We are seeking an experienced Tier 2 SOC Analyst to support enterprise-level Security Operations Centers (SOCs) by performing advanced triage, investigation, and response to cybersecurity incidents across complex environments. This role serves as an escalation point from Tier 1, focusing on deeper analysis, incident coordination, and threat validation within mature security programs.
This is a hands-on operational role requiring strong technical investigation skills, experience working in enterprise environments, and the ability to operate within defined incident response and security operations frameworks.
Key Responsibilities:
Serve as escalation point for Tier 1 analysts, performing advanced analysis and validation of security alerts
Investigate complex security incidents including malware, lateral movement, credential misuse, and insider threats
Perform deep log analysis across endpoints, network devices, cloud platforms, and security tooling
Coordinate incident containment, eradication, and recovery efforts with incident response and engineering teams
Execute and refine incident response playbooks and escalation procedures
Document investigation findings, root cause analysis, and response actions in case management systems
Support detection engineering efforts through alert tuning, rule refinement, and false positive reduction
Collaborate with threat intelligence and vulnerability management teams to contextualize alerts
Participate in post-incident reviews and continuous improvement initiatives
Mentor Tier 1 analysts and provide guidance on investigation techniques
Required Skills:
Experience operating as a Tier 2 SOC Analyst in an enterprise SOC environment
Hands-on experience with SIEM platforms such as Splunk, Sentinel, QRadar, or LogRhythm
Strong incident investigation and response experience across enterprise environments
Solid understanding of attacker tactics, techniques, and procedures (MITRE ATT&CK)
Experience analyzing endpoint, network, cloud, and application security logs
Familiarity with incident response frameworks and escalation models
Experience using case management and ticketing platforms
Strong analytical, documentation, and communication skills
Ability to operate independently in high-impact, time-sensitive situations