On behalf of our client, a leading telecoms solutions provider we are looking for a SOC Analyst L2 to be based at their offices in Nicosia, Cyprus.
Main Duties and Responsibilities
- Monitors and analyzes security events from various sources, including SIEM systems, EDR, Firewalls, and other security tools, with a focus on advanced threat detection
- Leads the investigation and response to complex security incidents, including identifying root causes, containing threats, and implementing remediation strategies
- Analyzes logs, network traffic, and other security data to identify and understand advanced threats, vulnerabilities, and attack vectors
- Develops and fine-tunes detection rules, use cases, and playbooks within QRadar and other security tools
- Conducts threat hunting activities to proactively identify potential threats and vulnerabilities in the environment
- Provides guidance and mentorship to SOC Analyst L1s, assisting them with incident investigations and knowledge development
- Collaborates with other cybersecurity teams and stakeholders to improve the organization’s security posture and response capabilities
- Stays up to date with emerging security threats, technologies, and best practices, and applies this knowledge to enhance SOC processes
- Documents and reports on security incidents, providing detailed analysis and recommendations for preventing future incidents
Main Requirements
- Bachelor’s degree in Computer Engineering, Computer Science, Information Security, or a related field
- Up to 3 years of extensive experience in a similar role
- Fluency in English in both verbal and written form; fluency in Greek will be considered an advantage
- Advanced expertise and hands-on experience with QRadar SIEM, including rule creation, tuning, and incident response
- Strong understanding of networking concepts, protocols, and security architectures
- In-depth knowledge of cybersecurity principles, protocols, and best practices
- Experience with common operating systems (Windows, Linux) and their security features
- Excellent analytical, problem-solving, and incident response skills
- Strong communication skills, with the ability to effectively convey complex technical information to both technical and non-technical stakeholders
- Familiarity with additional security tools such as IDS/IPS, EDR, firewalls, and vulnerability management systems
- Relevant certifications such as GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), or equivalent are highly desirable
- Experience in threat hunting and advanced threat detection techniques will be considered an advantage
Benefits
- Attractive remuneration package
- 21 days annual leave
- Everyday lunch
- Yearly bonuses based on the Company’s and employee performance
- Flexible working hours
- Modern office environment
- Continuous personal development and training opportunities
All CVs will be handled with the utmost confidentiality.