Website:
hirenext.net
Job details:
Company Description
HireNext specializes in providing managed service providers (MSPs) with dedicated, technical professionals across NOC, SOC, Cloud, Helpdesk, and Automation functions. Designed to deliver MSP-ready talent, our team integrates seamlessly into your toolsets, workflows, and service delivery model to ensure immediate operational impact. Backed by over 15 years of experience in MSP operations, our team knows the challenges and demands of the industry. Partnering with us means scaling your business with precision, efficiency, and a workforce strategy tailored to your needs, not just traditional staffing solutions.
Role Description
The SOC Analyst Level 2 is responsible for advanced threat detection, incident investigation, and response across client environments. This role builds upon Level 1 triage by performing deep analysis, validating true security incidents, and leading containment and remediation efforts.
As a senior member of the SOC, the Level 2 Analyst plays a critical role in improving detection capabilities, refining playbooks, and mentoring junior analysts. The role requires strong technical expertise, investigative skills, and the ability to correlate complex data across multiple systems.
This position is suited for experienced security professionals who can independently handle incidents, reduce dwell time, and enhance overall security posture. Success is measured by incident resolution effectiveness, reduced false positives, and continuous improvement of SOC operations.
Your core objectives in this role include:
- Advanced Threat Investigation: Conduct in-depth analysis of escalated alerts to confirm threats and determine scope and impact.
- Incident Response Leadership: Lead containment, eradication, and recovery efforts for confirmed security incidents.
- Detection & Tuning Improvement: Enhance detection rules, reduce false positives, and improve alert fidelity.
- Operational Mentorship: Support and guide Level 1 analysts, improving overall SOC effectiveness and maturity.
Responsibilities
· Investigate escalated alerts and perform deep forensic and behavioral analysis
· Correlate logs across security platforms
· Participate in incident response activities including containment and remediation
· Perform root cause analysis and document incident findings
· Develop and refine detection rules and alerting logic
· Identify gaps in monitoring and recommend improvements
· Support threat hunting activities across client environments
· Provide guidance and mentorship to Level 1 analysts
· Interface with engineering and infrastructure teams for remediation actions
· Participate in post-incident reviews and reporting
· Contribute to playbook development and automation opportunities
· Assist in onboarding new clients into SOC monitoring frameworks
Qualifications
· 3–5+ years of experience in cybersecurity or security operations
· Strong understanding of SIEM, EDR, firewall, and identity security tools
· Experience investigating security incidents and leading response efforts
· Knowledge of attack techniques, threat actors, and kill chain methodologies
· Strong understanding of networking, Windows/Linux systems, and cloud environments
· Ability to analyze logs and telemetry across multiple platforms
· Excellent documentation and communication skills
· Experience working in an MSP or multi-tenant environment (preferred)
Preferred Skills
· Experience with common security platforms
· Knowledge of threat hunting methodologies and frameworks (MITRE ATT&CK)
· Scripting/automation experience (PowerShell, Python)
· Experience with SOAR tools and automation workflows (e.g., Rewst)
· Relevant certifications (CySA+, CEH, GCIA, or equivalent)
Click on Apply to know more.