-
View all jobs
About
Position Description: The Level 2 (L2) SOC Analyst is a core resource on the security monitoring and response team within the Global Security Operations Center (GSOC).As a member of the Security Operations Team, the L2 Analyst is responsible for the monitoring, triage and response of all security alerts coming from SIEM and the security controls directly. The L2 Analyst will have a broad range of cybersecurity experience and skillsets including knowledge of Windows and Linux operating systems, knowledge of common threats and attack methodologies, an awareness of industry standards, and foundational endpoint and network-based analysis techniques. Your future duties and responsibilities: - Perform real-time monitoring of security alerts coming into the queue, detected by various security controls. - Continue the investigation of alerts that have been escalated by L1 Analysts within agreed upon SLA's. - Perform triage of indicators, as needed, and document all findings in the appropriate threat knowledgebase. - Perform In-depth analysis of the alert, outside of Standard Operating Procedures, utilizing foundational endpoint and network-based analysis techniques. - Create security incidents from presumed true-positive alerts; and close presumed false-positives. - Escalate alerts to L3 Analyst that are found to be undetermined, or that have additional requirements. - Support the Incident Handling (IH) and Incident Management (IM) teams - Maintain awareness of industry trends, new threats, technologies and common security standards and frameworks. - Engage and collaborate with other members of the GSOC, as well as internal CGI teams, during the investigation of alerts. - Make technical and procedural enhancement recommendations in coordination with other members of the team to improve the overall capabilities and maturity of the SOC. - Report security vulnerabilities identified during BAU activities, and provide recommendations to mitigate the overall security risk to the organization. - Review and enhance Standard Operating Procedure (SOP) documentation. - Utilize and contribute to internal threat intelligence. - Perform handover of priority items at the end of shift. - Review alert queues to identify patterns that may indicate broader security issues by taking a "short-term" view of event analysis (days and weeks) - Ability to think critically when investigating alerts in order to determine appropriate relevance of the alert details. - Knowledge of various networking concepts and the ability to utilize that knowledge during an investigation. Common concepts include IP Address subnets, Network Address Translation (NAT), and the knowledge of different protocols and ports. - Knowledge of Windows Event ID's, including knowing the event ID of common events such as logins, login failures, and process creations. - Knowledge of the Linux operating system including common log storage paths, and foundational Linux commands. - Knowledge of vulnerability management concepts, as well as Common Vulnerabilities and Exposures (CVE). - Ability to analyze log files utilizing clearly defined techniques. - Knowledge of network security monitoring techniques. - Knowledge of common threats and vulnerabilities, attack methodologies, threat actors, and attack tools. - Awareness of various industry standards and frameworks. - Knowledge of IT Service Management (ITSM) with a focus on Incident Management. - Knowledge of foundational open source intelligence techniques. - Foundational knowledge of any scripting or programming language, is an asset. - Knowledge of foundational malware analysis techniques, is an asset. - Knowledge of foundational reverse engineering techniques, is an asset. - Knowledge of foundational threat hunting techniques, is an asset. - Ability to methodically research unknown information; including being able to search for information, take notes, and manage time. - Ability to mentor junior analysts. Required qualifications to be successful in this role: - 2+ year degree of diploma with a focus on Information Security or Cybersecurity, is an asset, but not required. - Certifications in Information Security or Cybersecurity related disciplines (e.g., Security+, CySA+, SSCP, CISSP, CCSP, GSEC, GSOC, GCIA, GMON, GCDA, GCIH, GCFA, GREM, GNFA, CEH). - At least, 2 years of experience working in a Security Operations Center as a SOC Analyst, or similar role. - Experience handling alerts from SIEM and common security controls including Network and Host-based IPS and IDS, Endpoint Security, Firewall, and Cloud security. - Experience with using use third-party security intelligence tools, such as VirusTotal, to safely triage indicators.- Experience performing alert investigation utilizing foundational digital forensics techniques. - Experience producing security reports. Skills: Incident ManagementIT SecuritySecurity Operations CenterSecurity Certification
Nice-to-have skills
Position Description: The Level 2 (L2) SOC Analyst is a core resource on the security monitoring and response team within the Global Security Operations Center (GSOC).As a member of the Security Operations Team, the L2 Analyst is responsible for the monitoring, triage and response of all security alerts coming from SIEM and the security controls directly. The L2 Analyst will have a broad range of cybersecurity experience and skillsets including knowledge of Windows and Linux operating systems, knowledge of common threats and attack methodologies, an awareness of industry standards, and foundational endpoint and network-based analysis techniques. Your future duties and responsibilities: - Perform real-time monitoring of security alerts coming into the queue, detected by various security controls. - Continue the investigation of alerts that have been escalated by L1 Analysts within agreed upon SLA's. - Perform triage of indicators, as needed, and document all findings in the appropriate threat knowledgebase. - Perform In-depth analysis of the alert, outside of Standard Operating Procedures, utilizing foundational endpoint and network-based analysis techniques. - Create security incidents from presumed true-positive alerts; and close presumed false-positives. - Escalate alerts to L3 Analyst that are found to be undetermined, or that have additional requirements. - Support the Incident Handling (IH) and Incident Management (IM) teams - Maintain awareness of industry trends, new threats, technologies and common security standards and frameworks. - Engage and collaborate with other members of the GSOC, as well as internal CGI teams, during the investigation of alerts. - Make technical and procedural enhancement recommendations in coordination with other members of the team to improve the overall capabilities and maturity of the SOC. - Report security vulnerabilities identified during BAU activities, and provide recommendations to mitigate the overall security risk to the organization. - Review and enhance Standard Operating Procedure (SOP) documentation. - Utilize and contribute to internal threat intelligence. - Perform handover of priority items at the end of shift. - Review alert queues to identify patterns that may indicate broader security issues by taking a "short-term" view of event analysis (days and weeks) - Ability to think critically when investigating alerts in order to determine appropriate relevance of the alert details. - Knowledge of various networking concepts and the ability to utilize that knowledge during an investigation. Common concepts include IP Address subnets, Network Address Translation (NAT), and the knowledge of different protocols and ports. - Knowledge of Windows Event ID's, including knowing the event ID of common events such as logins, login failures, and process creations. - Knowledge of the Linux operating system including common log storage paths, and foundational Linux commands. - Knowledge of vulnerability management concepts, as well as Common Vulnerabilities and Exposures (CVE). - Ability to analyze log files utilizing clearly defined techniques. - Knowledge of network security monitoring techniques. - Knowledge of common threats and vulnerabilities, attack methodologies, threat actors, and attack tools. - Awareness of various industry standards and frameworks. - Knowledge of IT Service Management (ITSM) with a focus on Incident Management. - Knowledge of foundational open source intelligence techniques. - Foundational knowledge of any scripting or programming language, is an asset. - Knowledge of foundational malware analysis techniques, is an asset. - Knowledge of foundational reverse engineering techniques, is an asset. - Knowledge of foundational threat hunting techniques, is an asset. - Ability to methodically research unknown information; including being able to search for information, take notes, and manage time. - Ability to mentor junior analysts. Required qualifications to be successful in this role: - 2+ year degree of diploma with a focus on Information Security or Cybersecurity, is an asset, but not required. - Certifications in Information Security or Cybersecurity related disciplines (e.g., Security+, CySA+, SSCP, CISSP, CCSP, GSEC, GSOC, GCIA, GMON, GCDA, GCIH, GCFA, GREM, GNFA, CEH). - At least, 2 years of experience working in a Security Operations Center as a SOC Analyst, or similar role. - Experience handling alerts from SIEM and common security controls including Network and Host-based IPS and IDS, Endpoint Security, Firewall, and Cloud security. - Experience with using use third-party security intelligence tools, such as VirusTotal, to safely triage indicators.- Experience performing alert investigation utilizing foundational digital forensics techniques. - Experience producing security reports. Skills: Incident ManagementIT SecuritySecurity Operations CenterSecurity Certification
Nice-to-have skills
- Linux
- Scripting
- Vulnerability Management
- Windows
- Calgary, Alberta, Canada
- Cyber Security Specialist
- Pentester
- Security Analyst
- English
Key Skills
Ranked by relevance
cybersecurity
linux
siem
ids
reverse engineering
digital forensics
network security
malware analysis
cloud security
firewall
storage
cissp
cloud
ccsp
ceh
ips
nat
Related Jobs
3 roles aligned with this opportunity
View Job Details
Related
Senior Fullstack Entwickler:in - Java/Angular
2025-09-10
Full-time
Mid-Senior
Austria
Technology
Engineering
View Job Details
Related
DevOps Engineer (On-Prem Kubernetes / Linux / Infrastructure)
2026-04-13
Full-time
Associate
Netherlands
Technology
Information Technology
View Job Details
Related
Junior Data Analyst
2026-04-12
Full-time
Entry
Germany
Technology
Information Technology
Login to Apply
- Posted
- Jul 31, 2025
- Type
- Full-time
- Level
- Mid-Senior
- Location
- Calgary
- Company
- TieTalent
Industries
Technology
Information
Internet
Categories
Information Technology
Related Jobs
3 roles aligned with this opportunity
View Job Details
Related
Senior Fullstack Entwickler:in - Java/Angular
2025-09-10
Full-time
Mid-Senior
Austria
Technology
Engineering
View Job Details
Related
DevOps Engineer (On-Prem Kubernetes / Linux / Infrastructure)
2026-04-13
Full-time
Associate
Netherlands
Technology
Information Technology
View Job Details
Related
Junior Data Analyst
2026-04-12
Full-time
Entry
Germany
Technology
Information Technology