In this role, you will go far beyond simple alert triage — you’ll take full ownership of complex incidents, investigate advanced attacks, and directly contribute to neutralizing threats for international clients. It’s a position that combines deep technical analysis, hands-on response, and mentorship, while giving you a fast track toward senior roles such as L3 Incident Response, Threat Intelligence, Malware Analysis, or Threat Hunting. Along the way, you’ll master advanced security tooling, shape detection logic, and turn your findings into actionable intelligence that strengthens both our team and our clients’ defenses.
Investigate and respond to complex security incidents escalated from L1.
Correlate endpoint, network, and log data to identify root cause and impact.
Lead the full incident lifecycle: containment, forensics, remediation, reporting.
Conduct malware, phishing, and forensic analysis to uncover attacker techniques.
Perform proactive threat hunting and suggest improvements to detection logic.
Mentor L1 analysts and create clear incident reports for stakeholders.
1–3 years in SOC (L2) or similar role.
Hands-on experience with incident response, forensics, and malware analysis.
Strong knowledge of Windows/Linux/Mac artifacts, log and network analysis.
Familiarity with MITRE ATT&CK and threat hunting approaches.
Experience with SIEM, EDR/XDR, NDR; scripting (Python/PowerShell) is a plus.
Strong analytical thinking and ability to work with incomplete data.
Clear communication with both technical and business audiences.
Ownership, autonomy, and willingness to mentor others.
English B2+ for professional communication.
Nice to have:
Relevant certifications (e.g. GCIH, GCFA, GCFE, GNFA, GREM, eCIR, eCTHP, eCDFP).
Sounds like you? Apply now!