Search by job, company or skills

NETS-International Group

SOC L2 Engineer

This job is no longer accepting applications

new job description bg glownew job description bg glownew job description bg svg
  • Posted a month ago

Job Description

The SOC Level 2 Analyst is responsible for advanced security monitoring, incident analysis, investigation, and response across telecom infrastructure. The role focuses on handling escalated security incidents, performing deep-dive analysis, and supporting SOC Level 1 analysts while ensuring compliance with telecom security standards and regulatory requirements.

Key Responsibilities

  • Monitor and analyze security alerts escalated from SOC Level 1 using SIEM, SOAR, and security tools
  • Perform in-depth investigation of security incidents including malware, phishing, DDoS, insider threats, and network attacks
  • Lead incident response activities: containment, eradication, recovery, and post-incident analysis
  • Conduct log analysis across telecom systems (core network, RAN, IP/MPLS, OSS/BSS, cloud platforms)
  • Handle telecom-specific threats such as signaling attacks (SS7/Diameter), VoIP fraud, and DDoS
  • Develop and improve SOC use cases, detection rules, and alert tuning
  • Support threat hunting and proactive security monitoring activities
  • Coordinate with IT, network, and vendor teams during incident resolution
  • Prepare incident reports, RCA, and documentation for management and compliance
  • Mentor and guide SOC Level 1 analysts during investigations
  • Ensure adherence to telecom regulatory and security frameworks (NCA, CITC, ISO 27001, etc.)

Required Skills & Experience

  • 36 years of experience in SOC / Cyber Security Operations
  • Strong hands-on experience with SIEM platforms (Splunk, QRadar, ArcSight, Sentinel, etc.)
  • Good understanding of telecom networks (IP/MPLS, LTE/5G, VoIP, signaling protocols)
  • Experience with firewalls, IDS/IPS, EDR, WAF, DDoS protection tools
  • Strong incident response and log analysis skills
  • Knowledge of MITRE ATT&CK, kill chain, and threat intelligence
  • Familiarity with Linux, Windows, and basic scripting (Python, Bash advantage)

Certifications (Preferred)

  • CEH, GCIA, GCIH, Security+
  • Splunk/QRadar/ArcSight certifications
  • Telecom or cloud security certifications (AWS/Azure advantage)

Soft Skills

  • Strong analytical and problem-solving skills
  • Ability to work under pressure in a 24x7 SOC environment
  • Good communication and documentation skills
  • Team player with mentoring capabilities

Working Conditions

  • 24x7 shift-based SOC operations
  • On-call support as required

More Info

Job Type:
Industry:
Employment Type:

Job ID: 142098329

Similar Jobs