SOC Analyst Level 2
Confidential
Posted: January 30, 2026
Interested in this position?
Create a free account to apply with AI-powered matching
Quick Summary
We are seeking a skilled and motivated Level 2 SOC Analyst to join our 24/7 Security Operations Centre (SOC) team.
Required Skills
Job Description
Job Title: SOC Analyst L2
Business Unit: Cyber Security Services
Reports to: Security Operations Centre Manager
Location: Ergo, New Zealand
Ergo is a leading managed services provider dedicated to providing comprehensive cybersecurity solutions to our clients. We are seeking a skilled and motivated Level 2 SOC Analyst to join our 24/7 Security Operations Centre (SOC) team. The ideal candidate will be responsible for monitoring, detecting, and responding to security incidents, as well as performing in-depth analysis and investigation of potential threats. This role requires a strong understanding of cybersecurity principles, excellent analytical skills, and the ability to work in a fast-paced environment.
Responsibilities:
Monitor security alerts and events from various sources, including SIEM, IDS/IPS, firewalls, and other security tools.
Perform initial triage and analysis of security incidents to determine the severity and impact.
Investigate and respond to security incidents, including malware infections, phishing attacks, and network intrusions.
Conduct in-depth analysis of security events to identify root causes and recommend remediation actions.
Collaborate with other SOC team members and IT staff to resolve security incidents and improve overall security posture.
Develop and maintain incident response playbooks and procedures.
Create weekly and monthly customer reports
Provide guidance and mentorship to Level 1 SOC Analysts.
Stay up to date with the latest cybersecurity threats, trends, and technologies.
Participate in regular SOC team meetings and contribute to continuous improvement initiatives
Key Skills:
Strong problem solving and analytical skills.
Ability to work under pressure and meet service level agreements.
Network analysis and host-based triaging.
Knowledge of firewalls, IPS, endpoint protection, SIEM & Security Orchestration, Automation and Response (SOAR).
Knowledge of SIEM solutions like Microsoft Sentinel, Splunk, IBM QRadar or similar.
Solid understanding of network protocols and seven level OSI model.
Forensic experience collecting and correct handling of forensic artifacts.
Strong communication and interpersonal skills.
PowerBi reporting
Ability to work as part of a team and independently.
Strong interest in security tools for threat analysis, vulnerability scans, malware analysis and threat intelligence.