SOC Analyst (Level 2) focusing on security monitoring, incident response, and threat analysis at Profile Software in Greece. Key responsibilities include overseeing SOC operations and mentoring junior analysts.
Responsibilities
The role focuses on advanced security monitoring, incident response, threat analysis, and continuous improvement of SOC detection and response capabilities.
Primarily responsible for security event monitoring, management, and incident response.
Ensure incident identification, assessment, quantification, reporting, communication, mitigation, and monitoring.
Ensure compliance with SLAs, adherence to operational processes, and continuous process improvement to achieve operational objectives.
Revise and develop processes to strengthen the current Security Operations Framework, review policies, and identify challenges related to SLA management.
Perform threat management and threat modeling, identify threat vectors, and develop use cases for security monitoring.
Responsible for the integration of standard and non-standard logs into SIEM platforms.
Create reports, dashboards, and SOC operational metrics, presenting findings to the SOC Manager.
Coordinate with internal and external stakeholders, maintaining strong professional relationships.
Provide mentoring and technical guidance to less experienced analysts.
Act as an escalation point and orchestrator for significant security incidents.
Requirements
3–4 years of experience in the SOC field, with at least 2 years in a Level 2 or Level 3 position
BSc or MSc in Computer Science, Information Systems, or Information Security
Strong proficiency in incident management and incident response processes
Experience with security device management and SIEM platforms (knowledge of IBM QRadar will be considered a strong advantage)
Hands-on experience in threat hunting, SOAR orchestration, and integration of SIEM with EDR/XDR platforms
Experience with Python or PowerShell scripting for custom detection and automation
In-depth knowledge of cyberattack techniques, threat vectors, risk management, and incident response methodologies
Experience in threat management and threat intelligence analysis
Knowledge of operating systems including Windows, Linux, and Unix
Understanding of applications, databases, and middleware security considerations
Proficient in the preparation of technical reports, dashboards, and operational documentation
Excellent communication and coordination skills
Ability to handle high-pressure situations and interact effectively with key stakeholders
Strong analytical, problem-solving, and interpersonal skills
Working knowledge of Microsoft Office tools with strong proficiency in Excel
Certifications (preferred): GIAC GCIH, CompTIA CySA+, Splunk Certified Power User, Microsoft SC-200, CEH (Certified Ethical Hacker) – considered a plus
Benefits
Competitive remuneration package.
Private medical and life insurance.
Training and development opportunities within a market-leading, fast growing organization
Exposure to a multinational environment and global teams.
A collaborative and inclusive workplace culture focused on innovation and growth.
Security Incident Response Orchestration Lead at Bank of America defining automation for security incident workflows with a focus on Splunk SOAR and Tines. Collaborating with security operations and engineering teams to implement scalable solutions.
SOC Analyst II providing tier II cybersecurity support in a Security Operations Center environment. Conducting vulnerability assessments and analyzing cyber threats while training junior staff members.
Security Operations Analyst responsible for monitoring and responding to cybersecurity threats. Ensuring the confidentiality, integrity, and availability of data per compliance standards.
SOC Analyst responsible for cybersecurity incident management at Algosystems in Greece. Monitoring security threats, conducting investigations, and improving SOC services.
Cyber Operations Lead ensuring coordination of cyber operations between the Security Operations Center and internal business units. Enhancing security through effective incident response and threat management initiatives.
Solution Sales Manager enhancing revenue in financial services, focusing on ServiceNow IRM and Tanium solutions. Collaborating with teams and engaging C - level executives in Austria and Switzerland.
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.
Security Operations Intern responsible for security monitoring at Paddy Power Betfair. Involves data loss prevention investigations and content filtering analysis with a commitment to improving security posture.
SOC Analyst L2 responsible for managing and analyzing security incidents in digital transformation. Contributing directly to the protection of companies and infrastructures.