Cyber Security Analyst II

Overview

Remote
Depends on Experience
Contract - W2
Contract - Independent
Contract - 6 Month(s)
No Travel Required

Skills

DLP
Cyber Security
Bash
IBM QRadar
Microsoft
Kibana
Incident Management
Palo Alto
SIEM
Recovery
Scripting
Security Operations
TDR
Windows PowerShell

Job Details

We have a position for a Cyber Security Analyst II with one of our clients in Remote for an initial contract duration of 6 months. No third party candidates considered for this position.

We are seeking a Level 2 Security Operations Center (SOC) Analyst to support our Threat Detection & Response (TDR) team through engagement. In this role, you will play a key part in identifying, analyzing, and responding to cyber threats targeting our networks, systems, and customers. As a mid-level analyst, you will be responsible for triaging and investigating security alerts, escalating incidents as needed, and contributing to incident response efforts. You will work closely with internal teams and follow established playbooks and procedures to ensure timely and effective threat mitigation.

Key Responsibilities:

  • Monitor and analyze security events from various sources (SIEM, XDR and MSSP).
  • Investigate and triage alerts to determine severity, scope, and impact.
  • Escalate confirmed incidents to senior analysts or incident response teams when appropriate.
  • Support containment, eradication, and recovery efforts during active incidents.
  • Document findings and actions taken.
  • Collaborate with other SOC team members.
  • Follow Cox's security policies, procedures, and escalation protocols.

Qualifications:

  • 2+ years of experience in a SOC or cybersecurity operations role.
  • Familiarity with the following tools: QRadar JSA, Microsoft Defender XDR, Abnormal Security, ELK, Palo Alto Cortex xSoar, ReliaQuest GreyMatter, Microsoft DLP, Palo Alto DLP.
  • Practical experience with scripting and search languages such as Python, KQL, Kibana, AQL, PowerShell, Bash.
  • Strong analytical and problem-solving skills.
  • Understanding of common attack vectors, threat actor tactics, and incident response processes.
  • Excellent communication and documentation skills.
  • Ability to work independently in a fast-paced, team-oriented environment.
<>Required Skills</>

soc, Problem-solving, KQL, QRadar JSA, communication

<>Preferred Skills</>

Bash, PowerShell, elk, Palo Alto, Python, Microsoft Defender XDR, Palo Alto Cortex xSoar

3rd party vendors are not allowed.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.