Carter Murray
SOC Analyst - L2
Carter MurrayUnited Arab Emirates14 hours ago
Full-timeInformation Technology

Carter Murray is partnering with a leading entity in the UAE to appoint an L2 SOC Analyst – 5G Security.


This is a mid-level role within a specialized 5G Security Operations Center, focused on in-depth analysis and response to security incidents across next-generation telecom infrastructure. The successful candidate will lead investigations escalated by L1 analysts, perform root cause analysis, and contribute to the development of incident response procedures tailored to 5G environments.


Key responsibilities:

  • Conducting detailed analysis of security incidents escalated by L1 analysts.
  • Performing root cause analysis and advanced investigations to determine the extent of the threat.
  • Responding to and contain security incidents, minimizing their impact on network operations.
  • Using advanced security tools and techniques to analyze and mitigate threats.
  • Collaborating with other teams to implement security improvements and preventative measures.
  • Documenting and report on incident findings and actions taken.
  • Recommendations on incident response playbooks and procedures specific to 5G networks.
  • Knowledge of 4G/5G Protocols for RAN & Core.
  • Providing training and guidance to L1 SOC analysts.
  • Keeping up to date with the latest threats, vulnerabilities, and technologies in the 5G space.
  • Maintaining 5G SOC operations lab.
  • Ensuring the continued integrity and security of 5G RAN & Core networks.


Qualifications:

  1. Bachelor’s degree in computer science, Information Security, or a related field.
  2. Strong Understanding of TCP/IP protocol and OSI Seven Layers Model and various types of Networks.
  3. Strong understanding of cybersecurity and 5G technology.
  4. Experience with a range of security tools, including SIEM, SOAR, Intrusion detection/prevention systems (IDS/IPS), and forensic tools.
  5. Advanced analytical and problem-solving skills.
  6. Ability to conduct detailed advanced investigations and malware analysis.
  7. Strong communication and documentation skills.
  8. Ability to work under pressure and respond to incidents promptly.
  9. Industry certifications such as CCSP, CISSP, or similar are preferred.
  10. Experience in 4G/5G Security Operations.
  11. Experience working in ISP’s on 4G/5G technologies is a plus.
  12. Experience working on Splunk and MS Sentinel.
  13. Experience in IT and OT environments.


Certifications: CompTIA Security+, CSA (Certified SOC Analyst), CCNA CyberOPs, Cybersecurity Analyst (CySA+), GIAC Certified Incident Handler (GCIH), Blue Team Level 1 (BTL1), MITRE Attack Defender (MAD) , MS Sentinel and Splunk Certifications (Preferred).

Key Skills

Ranked by relevance