Position Details
About this role
SOC Analyst II role focused on detecting, analyzing, and responding to cybersecurity threats. You will monitor SIEM alerts, investigate suspicious activity, and document/maintain security logs while escalating confirmed incidents.
Key Responsibilities
- Monitor and analyze security alerts from SIEM and other tools
- Investigate suspicious activities and escalate confirmed incidents
- Perform threat analysis and containment procedures
- Document incidents and maintain security logs
- Collaborate with IT and security teams to improve detection and response
- Contribute to tuning security tools and updating playbooks
Technical Overview
Works in a Security Operations Center supporting incident response using SIEM tools such as Splunk, Microsoft Sentinel, IBM QRadar (Qradar), and CrowdStrike. Performs threat analysis, containment procedures, and continuously improves detections via tool tuning and playbook updates.
Ideal Candidate
The ideal candidate is a mid-level SOC Analyst with 3-6 years of hands-on cybersecurity experience in a SOC or IT operations environment. They have strong SIEM experience (Splunk, Sentinel, Qradar, CrowdStrike) and can monitor alerts, investigate suspicious activity, perform threat analysis, and document incidents with proper escalation.
Must-Have Skills
Nice-to-Have Skills
Tools & Platforms
Required Skills
Hard Skills
Soft Skills
Certifications
Preferred
Industry & Role
Keywords for Your Resume
Deal Breakers
3-6 years of experience in cybersecurity, IT operations, or SOC environment, Proficiency with SIEM platforms (Splunk, Sentinel, Qradar, CrowdStrike)
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile