Skip to content
Cybersecurity Active

SOC Analyst (Tier 2)

Poland (Remote)
Project-based
2+ years experience
Apply

About the Role

We are expanding our Security Operations Center team. We are looking for a SOC Tier 2 analyst who will handle advanced incident analysis and threat hunting.

Responsibilities

  • Security alert analysis and escalation
  • Advanced incident investigations (Tier 2)
  • Threat hunting and proactive threat detection
  • Event correlation in SIEM systems
  • Malware and IOC analysis
  • Creating detection rules and playbooks
  • Collaboration with Tier 1 and Tier 3
  • Incident reporting

Requirements

  • Minimum 2 years of SOC or security analysis experience
  • Practical knowledge of SIEM systems (IBM QRadar, Splunk, Microsoft Sentinel)
  • Knowledge of MITRE ATT&CK framework
  • Log analysis skills (Windows, Linux, network)
  • Basic malware analysis knowledge
  • EDR tools knowledge
  • Good command of English
  • Willingness to work in shifts

Nice to Have

  • Certifications: Security+, CySA+, GCIA, GCIH
  • Threat intelligence experience
  • SOAR knowledge
  • Programming skills (Python, PowerShell)
  • Forensic analysis experience

What We Offer

  • Project-based collaboration (B2B contract)
  • Attractive compensation + shift work bonuses
  • Remote work
  • SANS, EC-Council certification funding
  • Access to modern SOC tools
  • Working in an international environment
  • Career path to Tier 3 / Threat Hunter

Apply for Collaboration

Send your profile or portfolio. We'll respond within 7 business days.

Click to select a file or drag and drop

PDF, DOC, DOCX (max 10MB)

Have questions? Email us at: wspolpraca@nflo.pl