- Company Name
- Bouygues Telecom
- Job Title
- Analyste SOC N2 F/H
- Job Description
-
Job Title: SOC Analyst Level 2 (F/M)
Role Summary:
Operate and enhance the Security Operations Center (SOC) by detecting, investigating, and responding to security incidents across the organization’s infrastructure. Utilize SIEM, EDR, NDR, NIDS/HIDS, and SOAR tools to analyze logs, develop detection rules, and coordinate incident response from triage to resolution, while mentoring lower‑tier analysts and contributing to continuous SOC improvement.
Expectations:
• Minimum 5 years of professional experience in threat detection and incident response.
• Proficient in SIEM platforms (Splunk, QRadar, Chronicle), EDR, network and host intrusion detection, and SOAR orchestration.
• Deep understanding of network protocols, OSI model, and the MITRE ATT&CK framework.
• Skilled in threat hunting, log analysis, and scripting (Python or PowerShell).
• Ability to collaborate cross‑functionally and communicate complex technical findings clearly.
• Strong sense of autonomy, rigor, and continuous improvement mindset.
Key Responsibilities:
- Investigate security alerts and incidents using SIEM, EDR, NDR, NIDS/HIDS, and related tools.
- Create, tune, and maintain SIEM detection rules and other security controls.
- Lead end‑to‑end incident handling, coordinating with stakeholders per established processes.
- Produce detailed investigation reports and post‑mortem documentation.
- Provide technical recommendations for enhancing detection coverage and security posture.
- Train SOC Level 1 analysts and handle escalations from Level 1 tickets.
- Support crisis‑management activities and collaborate with Level 3 teams on complex incidents.
- Participate in and drive SOC improvement projects, including tooling, processes, and coverage expansion.
Required Skills:
- SIEM (Splunk, QRadar, Chronicle) – log analysis, query languages (Splunk SPL, QRadar AQL).
- Endpoint and network visibility tools (EDR, NDR, NIDS, HIDS).
- SOAR platforms and workflow automation.
- Threat intelligence integration and MITRE ATT&CK mapping.
- Incident response lifecycle management.
- Scripting: Python, PowerShell.
- Network protocol knowledge (TCP/IP, HTTP, DNS, etc.) and OSI model.
- Excellent written and verbal communication, team collaboration, and documentation.
Required Education & Certifications:
- Engineering degree (B.S./M.S.) or equivalent with a specialization in Cybersecurity.
- Minimum 5 years of SOC or incident response experience.
- Relevant certifications preferred: CISSP, CEH, GCIA, Splunk Certified Power User, QRadar Certified, or equivalent.