Skip to main content

SOC Analyst L2

On behalf of our client, a leading telecoms solutions provider we are looking for a SOC Analyst L2 to be based at their offices in Nicosia, Cyprus.

Main Duties and Responsibilities

  • Monitors and analyzes security events from various sources, including SIEM systems, EDR, Firewalls, and other security tools, with a focus on advanced threat detection
  • Leads the investigation and response to complex security incidents, including identifying root causes, containing threats, and implementing remediation strategies
  • Analyzes logs, network traffic, and other security data to identify and understand advanced threats, vulnerabilities, and attack vectors
  • Develops and fine-tunes detection rules, use cases, and playbooks within QRadar and other security tools
  • Conducts threat hunting activities to proactively identify potential threats and vulnerabilities in the environment
  • Provides guidance and mentorship to SOC Analyst L1s, assisting them with incident investigations and knowledge development
  • Collaborates with other cybersecurity teams and stakeholders to improve the organization’s security posture and response capabilities
  • Stays up to date with emerging security threats, technologies, and best practices, and applies this knowledge to enhance SOC processes
  • Documents and reports on security incidents, providing detailed analysis and recommendations for preventing future incidents

Main Requirements 

  • Bachelor’s degree in Computer Engineering, Computer Science, Information Security, or a related field
  • Up to 3 years of extensive experience in a similar role
  • Fluency in English in both verbal and written form; fluency in Greek will be considered an advantage
  • Advanced expertise and hands-on experience with QRadar SIEM, including rule creation, tuning, and incident response
  • Strong understanding of networking concepts, protocols, and security architectures
  • In-depth knowledge of cybersecurity principles, protocols, and best practices
  • Experience with common operating systems (Windows, Linux) and their security features 
  • Excellent analytical, problem-solving, and incident response skills
  • Strong communication skills, with the ability to effectively convey complex technical information to both technical and non-technical stakeholders
  • Familiarity with additional security tools such as IDS/IPS, EDR, firewalls, and vulnerability management systems
  • Relevant certifications such as GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), or equivalent are highly desirable
  • Experience in threat hunting and advanced threat detection techniques will be considered an advantage 

Benefits

  • Attractive remuneration package
  • 21 days annual leave
  • Everyday lunch
  • Yearly bonuses based on the Company’s and employee performance 
  • Flexible working hours
  • Modern office environment
  • Continuous personal development and training opportunities

All CVs will be handled with the utmost confidentiality.