SOC Analyst L2
InfyStrat
Posted: July 23, 2025
Interested in this position?
Create a free account to apply with AI-powered matching
Quick Summary
A SOC Analyst L2 is responsible for advanced incident investigation, correlation, and in-depth threat analysis, with a focus on threat hunting, malware analysis, and root cause analysis. The ideal candidate should have a strong background in IT, computer science, or cyber security, with 2-4 years of experience in SOC operations and threat detection. The successful candidate will work closely with OEM L3 Support for complex incident resolution and support dashboard reporting, policy compliance, and continuous improvement.
Required Skills
Job Description
· Handle advanced incident investigation, correlation, and in-depth threat analysis.
· Validate and respond to escalations from L1 Analysts.
· Perform threat hunting, malware analysis, and root cause analysis as needed.
· Implement and tune detection use cases and SIEM rules/playbooks.
· Coordinate with OEM L3 Support for complex incident resolution.
· Support dashboard reporting, policy compliance, and continuous improvement.
Qualification & Skills:
· Bachelor’s degree in IT, Computer Science, or Cyber Security.
· 2–4 years of experience in SOC operations, threat detection, and incident response.
· Good working knowledge of EDR, SIEM, SOAR, DLP, and network security tools.
· Relevant certifications preferred:EC-Council CEH, CompTIA CySA+, EC-Council CHFI, Cisco CyberOps Professional, or equivalent.
· Strong analytical, problem-solving, and communication skills.