Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Job Title: SOC Analyst – Level 2 & Level 3
Location: Madrid, Spain (Hybrid/On-site options available)
Job Type: Full-time
Language: English (Spanish is a plus)
Start Date: ASAP
About the Role
We are seeking experienced and motivated SOC Level 2 and Level 3 Analysts to join our growing Security Operations Center in Madrid. You will play a key role in monitoring, detecting, investigating, and responding to cybersecurity threats and incidents across our global infrastructure.
Key Responsibilities
SOC Analyst – Level 2:
- Monitor security alerts and logs using SIEM tools (e.g., Splunk, QRadar, Sentinel).
- Perform initial triage and investigation of security incidents.
- Escalate complex threats to Level 3 analysts with detailed context and recommendations.
- Analyze malware, phishing, and intrusion attempts to assess impact.
- Create and update incident tickets with findings and actions taken.
- Support vulnerability management and threat hunting activities.
- Collaborate with IT, infrastructure, and application teams on security-related events.
SOC Analyst – Level 3:
- Lead incident response efforts, including deep-dive forensic investigations.
- Develop and fine-tune detection rules, use cases, and playbooks.
- Perform threat intelligence correlation and attribution analysis.
- Support red team/blue team exercises and post-incident reviews.
- Mentor and support Level 1 and Level 2 SOC analysts.
- Collaborate with security engineering to implement security tools and improve SIEM/SOAR capabilities.
- Deliver threat briefings and incident reports to internal stakeholders.
Required Qualifications & Skills
For Level 2:
- 2–4 years of experience in a SOC, cybersecurity, or IT security role.
- Strong knowledge of SIEM platforms and log analysis.
- Good understanding of TCP/IP, networking protocols, firewalls, and endpoint protection.
- Familiarity with common threat vectors (malware, phishing, brute force, etc.).
- Certifications such as CompTIA Security+, CySA+, or CEH are a plus.
- Fluent in English; Spanish is an advantage.
For Level 3:
- 4–7+ years of experience in cybersecurity operations or threat detection & response.
- Expertise in SIEM, SOAR, EDR tools, and forensic analysis.
- Strong scripting skills (Python, PowerShell, etc.) for automation.
- Hands-on experience with incident response and threat intelligence.
- Relevant certifications such as GCIH, GCIA, OSCP, or CISSP.
- Strong communication and leadership skills.
Key Skills
Ranked by relevanceReady to apply?
Join Next Ventures and take your career to the next level!
Application takes less than 5 minutes