Cyber Security Analyst (SOC Tier 2) Shift Pattern - 24/7 coverage 4 days on 4 days off Competitive salary with a 30% shift allowance and excellent benefits. Our client is seeking Tier 2 Cyber Security Analyst to join their Cyber Threat Analysis Centre (CTAC). This role is vital in advancing threat investigations, triaging escalated incidents, and mentoring Tier 1 Analysts. The Tier 2 Analyst bridges foundational and advanced threat detection, ensuring efficient SOC operations. Key Responsibilities: Advanced Threat Analysis: Investigate and triage escalated security incidents, determining severity and response actions. SIEM & Log Analysis: Utilize Kusto Query Language (KQL) and SIEM platforms for event correlation and documentation. Incident Escalation: Identify and escalate critical threats to Tier 3 Analysts for further action. Threat Intelligence: Leverage OSINT techniques to enhance detection and improve situational awareness. Detection & Response: Collaborate with Tier 3 Analysts to refine detection rules, tune SIEM tools, and minimize false positives. Process Improvement: Contribute to refining incident response playbooks and detection workflows. Mentorship & Training: Guide and support Tier 1 Analysts, enhancing their technical skills and efficiency. Skills & Experience: Strong understanding of networking concepts, IP protocols, and traffic analysis. Advanced knowledge of Windows & Linux environments. Expertise in SIEM tools (e.g., ArcSight, Azure Sentinel) and KQL for log analysis. Familiarity with OSINT techniques for enhanced threat intelligence. Excellent communication skills, with the ability to explain technical issues clearly. Ability to work under pressure and manage workloads effectively. Proactive in learning new technologies and collaborating within the SOC. This is a great opportunity for cybersecurity professionals eager to grow in threat detection and response while contributing to a high-performing SOC team. Apply today