L2 SOC Analyst jobs in United States
cer-icon
Apply on Employer Site
company-logo

Quzara LLC · 1 month ago

L2 SOC Analyst

Quzara LLC is a leading Cyber Security Firm, seeking a highly skilled L2 SOC Analyst to join their Security Operations Center (SOC). The role involves monitoring and analyzing security events, identifying and investigating potential security threats, and responding to security incidents to protect clients from cybersecurity threats.

Internet
badNo H1BnoteU.S. Citizen Onlynote

Responsibilities

Monitor and analyze security events utilizing advanced security technologies and tools such as Microsoft Sentinel, Defender technologies, and Log Analytics
Apply deep threat intelligence to identify, investigate, and assess potential security threats
Perform incident response activities end-to-end, including triage, containment, eradication, recovery, and documentation
Use strong proficiency in both KQL (Kusto Query Language) and SPL (Search Processing Language) to conduct investigations, threat hunting, and security analytics
Respond to security incidents in real time, escalating when necessary, based on severity and impact
Collaborate with internal teams to resolve incidents and enhance overall security posture through lessons learned and process improvements
Participate in forensic investigations, log analysis, packet analysis, and endpoint forensics following NIST Incident Response guidelines
Conduct threat hunting leveraging frameworks such as MITRE ATT&CK
Identify trends, anomalies, and recurring issues to continuously improve SOC operations
Communicate incident findings, risk assessments, and recommendations to SOC leadership and relevant stakeholders
Willingness and capability to work in a 24/7 SOC environment
Experience working in government or highly regulated environments
Proficient in implementing and utilizing Microsoft Sentinel for SIEM/SOAR operations, automation, and incident response

Qualification

Microsoft SentinelIncident responseThreat intelligenceKQLSPLMicrosoft Defender XDRSplunkPacket analysisLog analysisEndpoint forensicsAnalytical skillsScripting languagesNIST Incident ResponseProblem-solving skillsCommunication skills

Required

US Citizenship Required
Minimum 5+ years of experience as a SOC Analyst within a SOC/MXDR or MSSP environment, performing L2-level responsibilities
Strong hands-on incident response experience
Experience with Microsoft Sentinel, Microsoft Defender XDR, Splunk, and modern EDR technologies (such as CrowdStrike, SentinelOne, Carbon Black, etc.)
Strong understanding of networking technologies, security best practices, and IR procedures
Experience with threat intelligence, threat hunting, and advanced detection techniques
Advanced proficiency with KQL and SPL queries
Strong analytical, investigative, and problem-solving skills
Strong verbal and written communication abilities
Experience in packet analysis, log analysis, and endpoint forensics
Willingness and capability to work in a 24/7 SOC environment

Preferred

Experience working in government, DoD, or regulated environments preferred
Familiarity with NIST Incident Response Framework and operational compliance requirements
Experience with scripting languages such as Python, PowerShell, or JavaScript
Relevant cybersecurity certifications required or strongly preferred, such as: GCIA, GCED, GCIH, GCFA, GNFA, CEH, CySA+, PenTest+, AZ-500, SC-200, SC-300, Security+, CASP+ (or equivalent IR/SOC-focused certifications)

Company

Quzara LLC

twittertwittertwitter
company-logo
Quzara is a DC-Based Cybersecurity firm. We are US Government SBA 8(a) Certified, WOSB and GSA HAC SINS approved in every category.

Funding

Current Stage
Early Stage

Leadership Team

leader-logo
Saif Rahman
CEO - Cloud Security, Architecture, XDR
linkedin
Company data provided by crunchbase