
Search by job, company or skills
We are hiring Level 1 (L1) and Level 2 (L2) SOC Analysts to support 24/7 security operations. The roles focus on security monitoring, incident detection, investigation, and response using Microsoft Sentinel and associated security tools.
SOC Analyst – Level 1 (L1)
Key Responsibilities
Monitor and analyze security alerts and events using Microsoft Sentinel and other security tools
Perform initial triage, validation, and classification of alerts
Follow incident response processes and understand client IRP (Incident Response Plan)
Escalate confirmed or suspicious incidents to L2 SOC Analysts
Execute predefined playbooks and response procedures
Document incidents, investigation steps, and outcomes in the SOC ticketing system
Maintain proper shift handovers to ensure continuous monitoring coverage
Required Skills & Experience
1–3 years of experience in SOC or security monitoring
Basic understanding of SIEM, incident handling, and cybersecurity fundamentals
Familiarity with Microsoft Sentinel, KQL queries, and security alerts is preferred
SOC Analyst – Level 2 (L2)
Key Responsibilities
Perform in-depth investigation and correlation of security alerts
Conduct threat hunting and root cause analysis across endpoint, network, and identity logs
Lead incident response and containment actions for confirmed incidents
Develop and optimize Sentinel analytics rules, KQL queries, and SOAR playbooks
Provide technical guidance to L1 analysts and handle escalations
Prepare incident reports and recommend security improvements
Required Skills & Experience
3–6 years of experience in SOC operations or incident response
Strong expertise in Microsoft Sentinel, KQL, and log correlation
Knowledge of MITRE ATT&CK, threat hunting, and digital forensics concepts
Job ID: 145528235