Overview
Remote
$100,000 - $120,000
Full Time
25% Travel
Skills
Active Directory
Analytical Skill
Certified Ethical Hacker
Cloud Computing
Communication
Computer Networking
DNS
Data Link Layer
Documentation
Dragon NaturallySpeaking
Firewall
GCIA
IBM QRadar
Incident Management
Network Layer
SIEM
Security Operations
Security+
Splunk
System On A Chip
TLS
Threat Analysis
Job Details
Position: SOC Engineer (L2)
Location: East Coast (US) Travel: 30 40% (paid) Experience: 5 7 years (strong L2 SOC background)
SOC Engineer (L2)
We are seeking an experienced SOC Engineer (L2) with 5-7 years of experience to support Security Operations Center (SOC). This role focuses on advanced security monitoring, incident analysis, and threat hunting to ensure continuous protection of the organization and client environments.
Key Responsibilities
- Perform L2 analysis of security alerts and incidents in a 24x7 SOC
- Investigate, triage, and respond to security incidents; escalate to L3 teams as required.
- Analyze daily and shift-based security reports and identify potential threats.
- Conduct proactive threat hunting to detect abnormal or malicious activities.
- Support security incident response activities, including containment and remediation support.
- Troubleshoot issues with log sources, SIEM integrations, and event correlations.
- Analyze and support remediation of findings from Red Team / Purple Team exercises.
- Maintain continuous awareness of evolving threats, vulnerabilities, and attack techniques.
Technical Skills & Experience
- Hands-on experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar).
- Strong understanding of infrastructure technologies including Active Directory, ADCS, DNS, web technologies, TLS, firewalls, and networking.
- Familiarity with security monitoring across on-prem, cloud, and hybrid environments.
Required Qualifications
- 4 5 years of experience in SOC, security operations, or incident response roles.
- Experience working in shift-based / 24x7 SOC operations.
- Strong analytical, troubleshooting, and incident documentation skills.
- Good oral and written communication skills for clear handovers and escalations.
Preferred Qualifications
- Experience supporting 24x7 SOC handover processes.
- Exposure to Red Team / Purple Team exercises and threat intelligence.
- Relevant security certifications (Security+, CEH, GCIA, or similar).
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.