MisuJob - AI Job Search Platform MisuJob

SOC Level 2 Analyst (Q Clearance)

Confidential

Las Vegas, Nevada permanent

Posted: April 28, 2026

Interested in this position?

Create a free account to apply with AI-powered matching

Quick Summary

This SOC Level 2 Analyst position involves analyzing security data to identify potential threats and vulnerabilities, and developing effective mitigation strategies to protect high-profile customers.

Job Description

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a SOC Level 2 Analyst for a potential opportunity to provide advanced monitoring, triage and response within a 24/7 Security Operations Center (SOC) environment. This role plays a key part in identifying and investigating security incidents, advising on mitigation and improving monitoring content and procedures. The SOC Level 2 Analyst will have hands-on experience with security technologies and be ready to contribute to threat detection, content development and continuous service improvement in a fast-paced operational setting. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market. Employment for this position is dependent on the successful award of the contract.

What you’ll be doing:

Monitor client sources of potential security incidents, health alerts with monitored solutions and requests for information. This includes the monitoring of real-time channels or dashboards, periodic reports, email inboxes, helpdesk or other ticketing systems, telephone calls and chat sessions.

Follow client and incident-specific procedures to perform triage of potential security incidents to validate and determine needed mitigation.

Escalate potential security incidents to client personnel, implement countermeasures in response to others and recommend operational improvements.

Keep accurate incident notes in the case management system.

Maintain awareness of the client’s technology architecture, known weaknesses, the architecture of the security solutions used for monitoring, imminent and pervasive threats as identified by client threat intelligence and recent security incidents.

Provide advanced analysis of the results of the monitoring solutions, assess escalated outputs and alerts from Level 1 Analysts.

Perform web hunting for new patterns/activities.

Advise on content development and testing.

Provide advice and guidance on the response action plans for information risk events and incidents based on incident type and severity.

Ensure that all identified events are promptly validated and thoroughly investigated.

Provide end-to-end event analysis, incident detection and manage escalations using documented procedures.

Devise and document new procedures and runbooks/playbooks as directed.

Maintain monthly Service Level Agreements (SLAs).

Maintain compliance with processes, runbooks, templates and procedures-based experience and best practices.

Assist the Cyber Hunting team with advanced investigations as needed.

Provide malware analysis (executables, scripts, documents) to determine indicators of compromise and create signatures for future detection of similar samples.

Continuously improve the service by identifying and correcting issues or gaps in knowledge (analysis procedures, plays, client network models), false positive tuning, identifying and recommending new or updated tools, content, countermeasures, scripts, plug-ins, etc.

Perform peer reviews and consultations with Level 1 Analysts regarding potential security incidents.

Serve as a subject matter expert in at least one security-related area (e.g., specific malware solution, Python programming, etc.).

Provide shift status and metric reporting as well as support weekly operations calls.

What you need to know:

Strong understanding of SOC operations, incident response workflows and monitoring tools.

Experience with malware behavior analysis and identification of indicators of compromise.

Familiarity with APT tactics, techniques and procedures.

Knowledge of security technologies such as SIEM, EDR, IDS/IPS and WAF.

Understanding of networking fundamentals, protocols (TCP/IP, DNS, HTTP) and infrastructure devices.

Awareness of security architecture principles and common defensive tools.

Must have’s:

Bachelor’s degree.

2+ years of working in a SOC or similar security operations environment, including 1+ years of experience in security technologies such as:

Security Information and Event Management (SIEM).

IDS/IPS, DLP, Endpoint Detection and Response (EDR).

Web Application Firewall (WAF), anti-virus and sandboxing solutions.

Host- and network-based firewalls, threat intelligence platforms or penetration testing tools.

One or more of the following certifications:

(ISC)2 Certified Information Security Professional (CISSP)

GIAC Certified Intrusion Analyst (GCIA)

GIAC Continuous Monitoring (GMON)

Certified Ethical Hacker (CEH) or equivalent.

Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.

Must have the ability to work shifts on a rotating basis for 24/7 support of clients.

Travel up to 15%, on average, based on the work you do and the clients and industries/sectors you serve.

Applicants must currently hold and maintain an active DOE Q or equivalent DoD Top Secret clearance.

Beneficial to have:

A strong desire to understand the what as well as the why and the how of security incidents.

Knowledge of Advanced Persistent Threats (APT) tactics, techniques and procedures.

Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc.

Understanding of common network infrastructure devices such as routers and switches.

Understanding of basic networking protocols such as TCP/IP, DNS, HTTP.

Basic knowledge in system security architecture and security solutions.

Where it’s done:

Onsite (Las Vegas, NV).

Why Apply Through MisuJob?

AI-Powered Job Matching: MisuJob uses advanced artificial intelligence to analyze your skills, experience, and career goals. Our matching algorithm compares your profile against thousands of job requirements to find positions where you have the highest chance of success. This saves you hours of manual job searching and ensures you only see relevant opportunities.

One-Click Applications: Once you create your profile, applying to jobs is effortless. Your resume and cover letter are automatically tailored to highlight the most relevant experience for each position. You can apply to multiple jobs in minutes, not hours.

Career Intelligence: Beyond job matching, MisuJob provides valuable career insights. See how your skills compare to market demands, identify skill gaps to address, and understand salary benchmarks for your experience level. Make data-driven decisions about your career path.

Frequently Asked Questions

How do I apply for this position?

Click the "Register to Apply" button above to create a free MisuJob account. Once registered, you can apply with one click and track your application status in your dashboard.

Is MisuJob free for job seekers?

Yes, MisuJob is completely free for job seekers. Create your profile, get matched with jobs, and apply without any cost. We help you find your dream job without any hidden fees.

How does AI matching work?

Our AI analyzes your resume, skills, and experience to understand your professional profile. It then compares this against job requirements using natural language processing to calculate a match percentage. Higher matches mean better fit for the role.

Can I apply to jobs in other countries?

Absolutely. MisuJob features jobs from companies worldwide, including remote positions. Filter by location or look for remote opportunities to find jobs that match your preferences.

Ready to Apply?

Join thousands of job seekers using MisuJob's AI to find and apply to their dream jobs automatically.

Register to Apply