L2 SOC Analyst
Experience : 5 plus years
Job Description :
Role Overview :
As a SOC L2 Analyst, the candidate will serve as a senior member of the Security Operations Center, responsible for advanced incident response, threat hunting, and automation using Palo Alto Cortex XSOAR. The candidate will lead efforts to streamline security workflows, integrate tools, and develop playbooks that enhance detection and response capabilities.
Key Responsibilities
• Advanced Threat Detection & Response
o Lead investigations of complex security incidents and coordinate response efforts.
o Perform root cause analysis and forensic reviews.
• SOAR Automation & Playbook Development
o Design, develop, and maintain XSOAR playbooks to automate repetitive SOC tasks.
o Create custom integrations using RESTful APIs and JSON.
• Tool Integration & Optimization
o Integrate SIEM, EDR, threat intelligence platforms, and other tools with XSOAR.
o Enhance existing automation workflows based on evolving threats and feedback.
• Documentation & Knowledge Sharing
o Document playbooks, integration procedures, and incident response workflows.
o Mentor junior analysts on automation best practices and XSOAR usage.
• Threat Hunting & Analysis
o Proactively identify threats using behavioural analytics and threat intelligence.
o Collaborate with threat intel teams to enrich detection logic.
Skills we are seeking for :
• Hands-on experience with Palo Alto Cortex XSOAR (mandatory)
• Strong understanding of SOC operations, incident response, and security frameworks
• Proficiency in Python scripting for custom automations
• Experience with RESTful APIs, JSON, and regular expressions
• Familiarity with SIEM, EDR, firewalls, and case management systems
• Excellent analytical, troubleshooting, and communication skills