Quzara LLC · 1 month ago
L2 SOC Analyst
Quzara LLC is a leading Cyber Security Firm, seeking a highly skilled L2 SOC Analyst to join their Security Operations Center (SOC). The role involves monitoring and analyzing security events, identifying and investigating potential security threats, and responding to security incidents to protect clients from cybersecurity threats.
Internet
Responsibilities
Monitor and analyze security events utilizing advanced security technologies and tools such as Microsoft Sentinel, Defender technologies, and Log Analytics
Apply deep threat intelligence to identify, investigate, and assess potential security threats
Perform incident response activities end-to-end, including triage, containment, eradication, recovery, and documentation
Use strong proficiency in both KQL (Kusto Query Language) and SPL (Search Processing Language) to conduct investigations, threat hunting, and security analytics
Respond to security incidents in real time, escalating when necessary, based on severity and impact
Collaborate with internal teams to resolve incidents and enhance overall security posture through lessons learned and process improvements
Participate in forensic investigations, log analysis, packet analysis, and endpoint forensics following NIST Incident Response guidelines
Conduct threat hunting leveraging frameworks such as MITRE ATT&CK
Identify trends, anomalies, and recurring issues to continuously improve SOC operations
Communicate incident findings, risk assessments, and recommendations to SOC leadership and relevant stakeholders
Willingness and capability to work in a 24/7 SOC environment
Experience working in government or highly regulated environments
Proficient in implementing and utilizing Microsoft Sentinel for SIEM/SOAR operations, automation, and incident response
Qualification
Required
US Citizenship Required
Minimum 5+ years of experience as a SOC Analyst within a SOC/MXDR or MSSP environment, performing L2-level responsibilities
Strong hands-on incident response experience
Experience with Microsoft Sentinel, Microsoft Defender XDR, Splunk, and modern EDR technologies (such as CrowdStrike, SentinelOne, Carbon Black, etc.)
Strong understanding of networking technologies, security best practices, and IR procedures
Experience with threat intelligence, threat hunting, and advanced detection techniques
Advanced proficiency with KQL and SPL queries
Strong analytical, investigative, and problem-solving skills
Strong verbal and written communication abilities
Experience in packet analysis, log analysis, and endpoint forensics
Willingness and capability to work in a 24/7 SOC environment
Preferred
Experience working in government, DoD, or regulated environments preferred
Familiarity with NIST Incident Response Framework and operational compliance requirements
Experience with scripting languages such as Python, PowerShell, or JavaScript
Relevant cybersecurity certifications required or strongly preferred, such as: GCIA, GCED, GCIH, GCFA, GNFA, CEH, CySA+, PenTest+, AZ-500, SC-200, SC-300, Security+, CASP+ (or equivalent IR/SOC-focused certifications)
Company
Quzara LLC
Quzara is a DC-Based Cybersecurity firm. We are US Government SBA 8(a) Certified, WOSB and GSA HAC SINS approved in every category.
Funding
Current Stage
Early StageRecent News
2025-12-17
Company data provided by crunchbase