About the Role
We are expanding our Security Operations Center team. We are looking for a SOC Tier 2 analyst who will handle advanced incident analysis and threat hunting.
Responsibilities
- Security alert analysis and escalation
- Advanced incident investigations (Tier 2)
- Threat hunting and proactive threat detection
- Event correlation in SIEM systems
- Malware and IOC analysis
- Creating detection rules and playbooks
- Collaboration with Tier 1 and Tier 3
- Incident reporting
Requirements
- Minimum 2 years of SOC or security analysis experience
- Practical knowledge of SIEM systems (IBM QRadar, Splunk, Microsoft Sentinel)
- Knowledge of MITRE ATT&CK framework
- Log analysis skills (Windows, Linux, network)
- Basic malware analysis knowledge
- EDR tools knowledge
- Good command of English
- Willingness to work in shifts
Nice to Have
- Certifications: Security+, CySA+, GCIA, GCIH
- Threat intelligence experience
- SOAR knowledge
- Programming skills (Python, PowerShell)
- Forensic analysis experience
What We Offer
- Project-based collaboration (B2B contract)
- Attractive compensation + shift work bonuses
- Remote work
- SANS, EC-Council certification funding
- Access to modern SOC tools
- Working in an international environment
- Career path to Tier 3 / Threat Hunter
Apply for Collaboration
Send your profile or portfolio. We'll respond within 7 business days.
Have questions? Email us at: wspolpraca@nflo.pl