Position Details
About this role
SOC Analyst T2 – Incident Responder is a Tier 2 technical leadership role in a 24x7 Security Operations Center. The position focuses on advanced threat analysis, incident response, and operating/optimizing SIEM and other security tools, especially Splunk, while mentoring junior analysts.
Key Responsibilities
- Perform advanced threat analysis and incident investigations
- Conduct incident response plan execution during breaches
- Operate and optimize SIEM and security tools (IDS/IPS, EDR, forensic tools)
- Tune SIEM to improve detection and alerting
- Lead Tier 2 case triage, escalation, and mentoring
Technical Overview
You will investigate incidents using SIEM platforms (Splunk, Fortinet, Microsoft Sentinel) and support cross-platform tool operation across Microsoft Defender, Wazuh, and Elastic. The role includes SOC tool tuning for detection and alerting, performing case triage/escalation, and coordinating incident response plans using IDS/IPS, EDR, and forensic tooling.
Ideal Candidate
The ideal candidate is a SOC Analyst T2/incident responder with 5+ years of SOC experience and strong advanced threat analysis skills. They can operate and tune SIEM platforms (especially Splunk) and lead Tier 2 incident triage, escalation, and investigations using tools like Microsoft Sentinel, Microsoft Defender, Fortinet, Wazuh, and Elastic. They also provide mentorship to junior analysts and make fast, informed decisions during critical incidents.
Must-Have Skills
Nice-to-Have Skills
Tools & Platforms
Required Skills
Hard Skills
Soft Skills
Certifications
Required
Industry & Role
Keywords for Your Resume
Deal Breakers
Must have minimum 5 years of experience in a SOC environment, Must have a related degree in IT or Cybersecurity OR equivalent Cybersecurity Certifications, Must be able to support Tier 2 case triage and escalation
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile