Jobiglo

لا توجد نتائج.

SOC L2 Analyst – Security Operations Center

Mindfire Technologies LLC · Doubaï

جديد
Mid 🇬🇧 English
SIEM Microsoft Sentinel Splunk QRadar LogRhythm USM Anywhere EDR Microsoft Defender CrowdStrike SentinelOne Sophos Trellix Windows Security Events Active Directory Firewall logs VPN logs Email security Endpoint alerts MITRE ATT&CK

وصف الوظيفة

About the role

We are seeking an experienced Security Operations Center (SOC) L2 Analyst to join Mindfire Technologies’ Cyber Defense Center in the UAE. The role involves advanced monitoring, triage, investigation and incident response for enterprise customers across a range of security platforms.

Key responsibilities

  • Perform L2 security event monitoring, triage, investigation and escalation.
  • Analyze alerts from SIEM, EDR, NDR, firewalls, IDS/IPS, email security, cloud and identity platforms.
  • Validate incidents, filter false positives and identify true‑positive attacks.
  • Conduct initial incident response, containment coordination and evidence collection.
  • Execute log analysis across Windows, Linux, network, firewall, VPN, cloud and Active Directory environments.
  • Investigate phishing, malware, brute‑force attempts, suspicious logins, endpoint alerts, privilege misuse and data exfiltration indicators.
  • Support threat‑hunting, IOC searches, use‑case tuning and detection rule improvements.
  • Prepare incident reports, investigation notes, shift handover documentation and customer‑facing updates.
  • Coordinate with L1 analysts, L3 specialists, customer IT teams and incident response teams while maintaining SLA compliance.

Required profile

  • Minimum 4–5 years of hands‑on SOC or cybersecurity operations experience.
  • Strong understanding of MITRE ATT&CK, cyber kill‑chain and incident response lifecycle.
  • Willingness to work rotating SOC shifts.
  • Relevant certifications such as Security+, CEH, CySA+, SC‑200, AZ‑500, Splunk, QRadar or Microsoft Sentinel are a plus.

Required skills

  • Proficiency with SIEM platforms (Microsoft Sentinel, Splunk, QRadar, LogRhythm, USM Anywhere).
  • Experience using EDR tools (Microsoft Defender, CrowdStrike, SentinelOne, Sophos, Trellix).
  • Deep knowledge of Windows Security Events, Active Directory, firewall and VPN logs.
  • Familiarity with email security, cloud security logs and endpoint alert data.
  • Ability to analyse malware alerts, phishing indicators, PowerShell activity and lateral movement.

Questions fréquentes

Le salaire n'est pas communiqué publiquement par le recruteur. Vous pouvez postuler et négocier directement avec Mindfire Technologies LLC.
Cliquez sur "Postuler maintenant" en haut de la page. Vous pouvez importer votre CV en 1 clic — Jobiglo extrait automatiquement vos informations et postule pour vous.

لماذا تبلغ عن هذا العرض؟

شكراً لإبلاغك. سنراجع هذا العرض.

قدم طلبك في 30 ثانية

أدخل بريدك الإلكتروني للتقديم. سيتم إنشاء حساب تلقائياً.

بالمتابعة، أنت توافق على شروط الاستخدام.

لديك حساب بالفعل؟ تسجيل الدخول

منشور منذ 23 ساعة

ينتهي شهر من الآن

5 مشاهدات · 0 طلبات

عزز فرصك

حمّل سيرتك الذاتية وسنقترح عليك الوظائف التي تناسب ملفك.

جاري تحليل سيرتك الذاتية...

Mindfire Technologies LLC

Doubaï