- Company Name
- BrokerLink
- Job Title
- Security Analyst II
- Job Description
-
**Job Title**
Security Analyst II
**Role Summary**
Lead and extend the Security Operations Center (SOC) function by conducting advanced security event analysis, managing incident response, and escalating complex issues. Drive continuous improvement of detection, automation, and threat-hunting processes while ensuring compliance with industry standards and organizational policies.
**Expectations**
- Serve as the primary escalation point for SOC Analyst I.
- Own incident lifecycle from detection to remediation and post‑mortem.
- Maintain and elevate the organization’s security posture through proactive threat hunting and automation.
- Deliver timely, accurate incident reporting to technical teams and leadership.
**Key Responsibilities**
- Monitor SIEM alerts, perform triage, deep‑dive analysis, and root‑cause investigations.
- Design, refine, and deploy SIEM rule sets, alerts, and dashboards.
- Lead incident response activities: containment, eradication, recovery, and documentation.
- Utilize SOAR platforms to automate investigation, ticketing, and remediation workflows.
- Conduct forensic analysis of logs, endpoint telemetry, and network traffic.
- Develop and deliver security awareness training for staff, developers, and IT teams.
- Execute proactive threat‑hunting exercises and track emerging threats and vulnerabilities.
- Produce incident summaries and security performance reports for technical and executive stakeholders.
- Collaborate with security advisors on projects, providing SOC insights and ensuring alignment with operational security needs.
- Maintain security playbooks, ensuring standardized detection and response procedures.
- Ensure SOC operations align with industry frameworks (e.g., NIST, ISO 27001) and regulatory requirements (e.g., GDPR, PCI‑DSS).
- Support vulnerability management initiatives and regulatory compliance efforts.
**Required Skills**
- Deep knowledge of SIEM/SOAR platforms (e.g., Splunk, ArcSight, QRadar, Sentinel).
- Strong log and network traffic analysis skills.
- Proficiency in threat hunting, anomaly detection, and vulnerability assessment.
- Experience with security automation frameworks and playbook development.
- Solid understanding of incident response lifecycle, forensic techniques, and evidence handling.
- Familiarity with IT security frameworks (NIST, ISO 27001, PCI‑DSS, GDPR).
- Excellent analytical, problem‑solving, and documentation abilities.
- Strong communication skills for incident briefings and stakeholder coordination.
- Leadership or mentorship experience with junior analysts.
**Required Education & Certifications**
- Bachelor’s degree (or equivalent) in Computer Science, Information Technology, Cybersecurity, or related discipline.
- 3–5 years of hands‑on experience in SOC/incident response and threat analysis.
- Industry certifications such as CompTIA Security+, CEH, CISSP, or equivalent are advantageous but not mandatory.