SOC analyst- L2

Overview

Full Time
Part Time
Accepts corp to corp applications
Contract - W2
Contract - Independent
Contract - 12

Skills

SOC

Job Details

SOC analyst- L2 - St Peters, Florida. Boston, MA. New York -Hybrid

Hybrid- 3 days in office

L2 SOC analyst tittle

Job Description

Required Qualifications

  • Experience: Min8 years in cybersecurity, with a focus on SOC operations and incident response.
  • Environment: Experience in a 24x7 operational environment, preferably across multiple geographies.
  • Technical Skills:
  • Good understanding of networking protocols, operating systems (Windows/Linux), and security technologies.
  • Exposure to malware analysis and digital forensics.
  • Familiarity with cybersecurity frameworks (e.g., NIST, MITRE ATT&CK, ISO 27001).
  • Hands-on experience with tools such as:
  • SIEM: Splunk, CrowdStrike, QRadar
  • EDR: CrowdStrike, Carbon Black, SentinelOne
  • SOAR: Palo Alto XSOAR, Splunk SOAR
  • Forensics: FTK Imager, Autopsy, Wireshark, Procmon

Preferred Certifications:

  • GIAC Certified Incident Handler (GCIH)
  • GIAC Certified Forensic Analyst (GCFA)
  • Certified Ethical Hacker (CEH)

Soft Skills & Attributes:

  • Strong analytical and problem-solving mindset.
  • Excellent communication and collaboration skills.
  • Ability to work under pressure and manage multiple priorities.
  • High integrity and a proactive, team-oriented attitude.
  • Strategic and tactical thinking with attention to detail.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.