
Security Analyst II
Automate your job search with Sonara.
Submit 10x as many applications with less effort than one manual application.1
Reclaim your time by letting our AI handle the grunt work of job searching.
We continuously scan millions of openings to find your top matches.

Job Description
About the Role:
As a Security Analyst II, you will be responsible for supporting the 24/7/365 Security Operations Center (SOC). You will serve as the escalation point for the Security Analysts (Tier 1) and provide backup when required, answering incoming calls and internal and external emails.
Your priority is to monitor, detect, and respond to customer alerts received by various logs and network sources within the Endpoint Detection and Response (EDR) solutions. You will also be reviewing vulnerability reports and assessments.
Responsibilities:- Review internal tickets and assign them according to designed workflows
- Analyze intrusions, detect incidents, and assist in response
- Seek out attacker presence on client’s networks and logs with advanced threat hunting
- Identify attack vectors, threat tactics, and attacker techniques
- Proactively engage with clients to understand their security needs and wants
- Regularly assist with reviews and provide reports on observed threats
- Research new threats to enterprise environments
- Assist Senior Security Analysts as directed by leadership to participate in hunt activities and intelligence actions
- Work with the team to resolve issues, tweak current processes, and develop/improve existing work instructions
- Analyze Indicators of Compromises (IOCs) and work with the team to develop countermeasures
- Shift work and holiday work are required as part of a 24/7/365 SOC
- MUST have a minimum of 1-2 years of experience with one or more of the following:
- Microsoft Defender (minimum of 1 year)
- CrowdStrike (minimum of 2 years)
- SentinelOne (minimum of 2 years)
- Demonstrated experience with some of the following:
- Packet Capture (PCAP) analysis using Wireshark
- Familiarity with commercial or open source log or SIEM solutions
- Event analysis, correlation, reporting and alerting
- Reverse engineering malware and host-based analysis/detection
- Service discovery tools such as Nmap and Shodan
- Vulnerability scanning tools such as Nessus, Nexpose, and/or Qualys
- Experience with system or network administration (Unix/Linux experience preferred)
- Experience and knowledge of information security, IPv4/v6 networks, network devices, proxies, and IDS/IPS tools and applications
- Endpoint, Detection and Response (EDR) solution experience (FireEye, SentinelOne, Crowdstrike for example)
- Prior experience working within a SOC or similar environment
- Industry-recognized certifications related to cybersecurity or
- 2-year degree in computer technologies and industry-recognized certifications
- 4-year degree in Computer Science or equivalent
- Continuous growth progress within the Cybersecurity/Information technology field by accumulating certifications, degrees and/or CPEs
- Intermediate level log analysis and review skills
- Beginner experience with vulnerability scanning tools and reporting
- Intermediate Email phishing detection/analysis experience
- Experience working within ticketing systems
- Medical, dental, vision, disability, FSA, HSA, life and AD&D insurance, 401(k) Plan.
- Time off: PTO, sick, holiday, & parental leave details are available
- Money: We provide competitive compensation packages based on the market and your overall credentials.
Powered by JazzHR
Automate your job search with Sonara.
Submit 10x as many applications with less effort than one manual application.
