✦ Luna Orbit — Cybersecurity

SOC Analyst II

at Caesars Entertainment

📍 Las Vegas, NV, United States Unknown Posted April 17, 2026
Type Not Specified
Experience mid
Exp. Years 3-6 years of experience
Education Bachelor's or Master's degree preferred
Category Cybersecurity

SOC Analyst II role focused on detecting, analyzing, and responding to cybersecurity threats. You will monitor SIEM alerts, investigate suspicious activity, and document/maintain security logs while escalating confirmed incidents.

  • Monitor and analyze security alerts from SIEM and other tools
  • Investigate suspicious activities and escalate confirmed incidents
  • Perform threat analysis and containment procedures
  • Document incidents and maintain security logs
  • Collaborate with IT and security teams to improve detection and response
  • Contribute to tuning security tools and updating playbooks

Works in a Security Operations Center supporting incident response using SIEM tools such as Splunk, Microsoft Sentinel, IBM QRadar (Qradar), and CrowdStrike. Performs threat analysis, containment procedures, and continuously improves detections via tool tuning and playbook updates.

The ideal candidate is a mid-level SOC Analyst with 3-6 years of hands-on cybersecurity experience in a SOC or IT operations environment. They have strong SIEM experience (Splunk, Sentinel, Qradar, CrowdStrike) and can monitor alerts, investigate suspicious activity, perform threat analysis, and document incidents with proper escalation.

3-6 years of experience in cybersecurityIT operationsor SOC environmentMonitor and analyze security alerts from SIEM and other toolsInvestigate suspicious activities and escalate confirmed incidentsDocument incidents and maintain security logs
Certifications such as Security+CySA+or equivalent preferredBachelor's or Master's degree preferred
SIEMSplunkMicrosoft SentinelIBM QRadar (Qradar)CrowdStrikesecurity logs
SIEM platformsSplunkSentinelQradarCrowdStrikenetworkingmalware behaviorincident responsethreat analysiscontainment proceduressecurity logstuning security toolsupdating playbooks
SIEM platformsSplunkMicrosoft SentinelIBM QRadar (Qradar)CrowdStrikenetworkingmalware behaviorincident responsethreat analysiscontainment proceduressecurity alert monitoringincident investigationescalation of confirmed incidentssecurity logsincident documentationsecurity tool tuningupdating playbooksplaybook updates
attention to detailability to work under pressurecollaborationcommunicationteamwork

Preferred

CompTIA Security+CompTIA CySA+
Industry Media
Job Function Detect, analyze, and respond to cybersecurity threats in a SOC using SIEM and incident response procedures
Role Subtype SOC Analyst L2
Tech Domains Cybersecurity, Networking / TCP-IP
SOC Analyst IISOC AnalystSOC environmentcybersecurityIT operationsSIEMSIEM platformsSplunkSentinelQradarCrowdStrikenetworkingmalware behaviorincident responsethreat analysiscontainment proceduresincident investigationsecurity logstuning security toolsSecurity+CySA+playbooksMicrosoft Sentinel

3-6 years of experience in cybersecurity, IT operations, or SOC environment, Proficiency with SIEM platforms (Splunk, Sentinel, Qradar, CrowdStrike)

Apply for this Position →

Get matched to jobs like this

Luna finds roles that fit your skills and career goals — no endless scrolling required.

Create a Free Profile