Description
Level 2 SOC Analyst
Well known brand require a Level 2 SOC Analyst to join their Security Operations Team, who will be responsible for the management, response and/or escalation of security incidents received from Level 1 SOC Analysts.
This role is Hybrid working, you will be required to travel to the office in Amsterdam 2 days a week.
The L2 SOC Analyst will have the following experience:
- Vulnerability Scanning, responding to alerts through to resolution
- Performing analysis in reviewing security alerts, triaging
- EDR Tools eg Carbon Black, Crowdstrike
- SIEM Tools eg Splunk, IBM, LogRhythm, Sentinel, Qradar, Alien Vault, Solarwind SEM, Quadrant, Kibana (Elastic Search, using KQL for log analysis)
- Networking Monitoring Tools
- Worked in an internal SOC Managing Incidents
- Worked as a SOC Analyst within a complex large scale business
- IDS/IPS, Firewalls, Anti-virus, Active Directory, DLP, proxies, and honeypots using SIEMs tools
If you're interested, please apply to the advert or contact me at (see below)