Validating profile... 0% complete

What is your current level of experience in freelance work?

 

 

Level 2 (L2) SOC Analyst

Job Title: Level 2 (L2) SOC Analyst Location: Onsite — West Lake, TX (MUST BE ONSITE) Duration: 3 years Hourly Rate: $65–$75/hour Work Schedule: 24x7x365 rotational coverage ________________________________________ Role Overview: We are seeking an experienced L2 SOC Analyst to join our onsite Security Operations Center team in West Lake, TX. This role serves as a key escalation point for L1 SOC Analysts, providing advanced technical expertise in threat analysis, incident investigations, containment, and remediation support. The L2 SOC Analyst will also help improve operational playbooks, tune threat intelligence integrations, and mentor junior analysts to strengthen overall SOC performance. ________________________________________ Key Responsibilities: • Deliver 24x7x365 security event monitoring and oversight • Act as a technical escalation resource for L1 SOC Analysts, providing mentorship and support • Conduct advanced incident analysis, threat investigations, and digital forensics • Correlate threat intelligence with SIEM events to identify and assess emerging risks • Provide containment, recovery, and remediation recommendations to client teams • Support onsite breach investigations and forensic reviews as needed • Define, update, and optimize SOPs, incident response playbooks, and SOAR automation logic • Maintain and manage threat intelligence feeds within the SIEM environment • Generate detailed reports on incidents, investigations, trends, and threat landscape updates ________________________________________ Required Qualifications: • Minimum 5 years of experience working in a Managed SOC environment • Strong technical expertise in threat analysis, advanced incident response, and remediation • Proficiency with SIEM platforms (e.g., Splunk, QRadar, ArcSight) and SOAR tools • Familiarity with threat intelligence platforms, digital forensics tools, and breach investigation processes • Solid understanding of advanced attack techniques, TTPs, and frameworks like MITRE ATT&CK • Availability to work on a 24x7x365 rotational schedule, including nights, weekends, and holidays ________________________________________ Preferred Skills (Nice to Have): • Relevant certifications (e.g., GCIA, GCIH, CISM, CISSP, CEH, SOC Analyst, SANS) • Prior experience mentoring or leading SOC teams • Experience defining and optimizing SOAR playbooks and automation workflows • Strong client communication skills and the ability to deliver actionable, clear recommendations