Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
About the Company
Our client is an international cybersecurity firm protecting government organizations, critical infrastructure, and enterprises worldwide. With cutting-edge tools and a mission-driven culture, they safeguard against some of today’s most advanced cyber threats.
About the Role
We are seeking a Tier 2 SOC Analyst to join the team. As a Tier 2 analyst, you will handle incidents escalated from Tier 1, diving deeper into alerts, analyzing patterns, and identifying potential threats. You’ll leverage SIEM tools like Crowdstrike, Splunk, and Microsoft Defender to investigate incidents, reduce false positives, and escalate complex cases when needed.
This is an ideal role for someone who has a strong foundation in SOC operations and wants to expand their skills in advanced investigations, threat hunting, and incident response.
Key Responsibilities
- Investigate security alerts escalated by Tier 1 analysts and determine root cause.
- Correlate data across host, network, identity, and log sources to validate potential incidents.
- Tune SIEM alerts and reduce false positives to improve detection effectiveness.
- Conduct threat hunting activities using indicators of compromise (IOCs), adversary TTPs, and internal datasets.
- Support the development and execution of runbooks and escalation processes.
- Escalate complex or confirmed incidents to Tier 3 or Incident Response teams.
- Document investigation steps and findings for both technical and management audiences.
- Collaborate with internal IT, application, and infrastructure teams during investigations.
Qualifications
- 3–5 years of SOC or security operations experience, with at least 2+ years in a Tier 2 analyst role.
- Strong hands-on experience with SIEM tools (Crowdstrike, Splunk, Microsoft Defender).
- Demonstrated ability to analyze and correlate host, network, and identity data.
- Experience tuning alerts, reducing false positives, and validating security incidents.
- Familiarity with threat intelligence (IOCs, TTPs) and their application in incident detection.
- Proficiency with Windows, macOS, and Linux environments.
- Strong communication and documentation skills.
- Analytical, curious, and adaptable problem solver.
Why Join
- Play a key role in protecting global organizations from advanced cyber threats.
- Work with leading SOC tools and technologies in a collaborative environment.
- Gain exposure to advanced investigations, incident response, and threat hunting.
- Join a mission-driven firm with opportunities to grow your skills and career.
Key Skills
Ranked by relevanceReady to apply?
Join Graystone Group and take your career to the next level!
Application takes less than 5 minutes