
Security Analyst L2
Send a job offer directly to this candidate
SOC Analyst (L2) with 3+ years of experience in Security Operations Center (SOC), specializing in SIEM monitoring, threat detection, incident response, and threat hunting. Hands-on expertise in Microsoft Sentinel, IBM QRadar, CrowdStrike Falcon, and
Microsoft Defender. Proven ability to reduce false positives, improve detection use cases, and handle critical (P1/ P2) incidents in
24x7 environments. Strong understanding of MITRE ATT&CK, log analysis, and endpoint security across enterprise environments.
SOC Analyst (L2) with 3+ years of experience in Security Operations Center (SOC), specializing in SIEM monitoring, threat detection, incident response, and threat hunting. Hands-on expertise in Microsoft Sentinel, IBM QRadar, CrowdStrike Falcon, and
Microsoft Defender. Proven ability to reduce false positives, improve detection use cases, and handle critical (P1/ P2) incidents in
24x7 environments. Strong understanding of MITRE ATT&CK, log analysis, and endpoint security across enterprise environments.