Looking for a career?

Tier 2 SOC Analyst

 We are committed to connecting you with top-tier employers who recognize the value of your military background. Don’t miss out on this chance to unlock your potential and embark on a fulfilling civilian career. Submit your information today. Stay tuned for exciting updates and get ready to take the next step towards a brighter future with Skilled Vets!

Tier 2 SOC Analysts

Top Skills:

  1. CrowdStrike for Endpoint
  2. Splunk for Logging
  3. Experience with Cloudflare (these people have to be cloud oriented)
  4. Self driven and self sufficient, getting stuff done and explaining why they did it


We are seeking a Cyber Defense Analyst II to join the Security Operations Center (SOC) within Technology Information Security organization at our Global Capability Center (GCC). This role is a high‑visibility, hands‑on position responsible for monitoring, investigating, and responding to security events across global enterprise environment.

As a key member of the SOC, the Cyber Defense Analyst II will independently manage security alerts, perform detailed investigations, and contribute to ongoing improvements in threat detection and incident response capabilities. The role supports multiple security platforms and technologies and works closely with global SOC teams, IT partners, business stakeholders, and third parties to ensure consistent and effective cyber defense operations.

This position reports to the Cyber Defense Manager and plays an important role in aligning day‑to‑day security operations with broader cybersecurity strategy, compliance obligations, and roadmap—while supporting global, follow‑the‑sun security coverage from the Hyderabad GCC.

Primary Responsibilities

  • Work independently within the alert queue to triage, investigate and respond to events produced by the SIEM solution by utilizing a wide array of tools to mitigate active threats
  • Enforce information security policy, standards and guidelines for business operations and technology requirements
  • Identify IT security risks from technical and functional perspectives
  • Responsible for case management by capturing the event’s history, status and potential impact
  • Configure and work with SIEM and SOAR tools
  • Work effectively in a fast-paced team environment by communicating in a detailed, concise manner
  • Maintain working knowledge of threat detection as the industry evolves
  • Perform other duties as assigned
  • Act as a mentor for Analyst I’s
  • Responsible for supporting Security Operations Center during Operating hours and in an on-call rotation outside Operating hours
  • The ability to adapt to changing environments or alternative methods
  • Be customer service oriented with the ability to meet customer expectations within project scope


Qualifications

 3 years’ experience as a SOC analyst is required

  • Experience working with SIEM systems, threat intelligence platforms, security automation and orchestration solutions, intrusion detection and prevention systems (IDS/IPS), file integrity monitoring (FIM), DLP and other network and system monitoring tools
  • Advanced level of experience and/or training in Splunk Enterprise Security and SOAR
  • Familiarity with Cloud services like Azure and AWS is a plus
  • Experience with scripting languages, such as Python
  • Knowledge of a variety of Internet protocols
  • Track record of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively
  • Obtain at least one Information Security based Certification such as Security+ (CompTIA), GIAC Certified Incident Handler

SME in at least 3 Security Controls

Role: Tier 2 SOC Analysts
Work Location: San Diego CA, Fort Mills SC, Boston MA, or Austin TX – partially remote
Number of positions: 4-6
Years of experience: 3+ yrs
Pay Rate: $60 range (6-Month contract with possible extension)