PRI Technology
Level 2 and Level 3 SOC Analyst Openings
Responsibilities
Monitor and analyze security alerts from SIEM, EDR, and other security platforms to identify potential threats.
Perform in-depth investigation of suspicious activity, correlating data across multiple sources to determine scope and impact.
Lead the resolution of low to moderately complex security incidents, including containment, eradication, and recovery actions.
Escalate confirmed incidents to L3 analysts or incident response teams with detailed documentation and recommendations.
Support containment and remediation efforts during active incidents.
Conduct initial root cause analysis and contribute to post-incident reviews to identify gaps and improve future response efforts.
Leverage threat intelligence, behavioral analytics, and contextual data to enhance detection, investigation, and resolution capabilities.
Collaborate with detection engineering teams to develop, test, and tune detection rules and use cases.
Perform basic malware analysis, log correlation, and network traffic inspection to support incident resolution.
Maintain up-to-date knowledge of the threat landscape, including attacker tactics, techniques, and procedures (TTPs), and apply this knowledge to improve incident handling.
Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate incident resolution efforts.
Document investigation steps, findings, and resolution actions in a clear, structured, and timely manner.
Participate in SOC shift rotations to ensure 24/7 monitoring and rapid response to security events.
Contribute to the continuous improvement of SOC processes, playbooks, and knowledge base, with a focus on enhancing incident resolution workflows.
Seniority level
Not Applicable
Employment type
Full-time
Job function
Information Technology
Industries
Manufacturing
#J-18808-Ljbffr
Responsibilities
Monitor and analyze security alerts from SIEM, EDR, and other security platforms to identify potential threats.
Perform in-depth investigation of suspicious activity, correlating data across multiple sources to determine scope and impact.
Lead the resolution of low to moderately complex security incidents, including containment, eradication, and recovery actions.
Escalate confirmed incidents to L3 analysts or incident response teams with detailed documentation and recommendations.
Support containment and remediation efforts during active incidents.
Conduct initial root cause analysis and contribute to post-incident reviews to identify gaps and improve future response efforts.
Leverage threat intelligence, behavioral analytics, and contextual data to enhance detection, investigation, and resolution capabilities.
Collaborate with detection engineering teams to develop, test, and tune detection rules and use cases.
Perform basic malware analysis, log correlation, and network traffic inspection to support incident resolution.
Maintain up-to-date knowledge of the threat landscape, including attacker tactics, techniques, and procedures (TTPs), and apply this knowledge to improve incident handling.
Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate incident resolution efforts.
Document investigation steps, findings, and resolution actions in a clear, structured, and timely manner.
Participate in SOC shift rotations to ensure 24/7 monitoring and rapid response to security events.
Contribute to the continuous improvement of SOC processes, playbooks, and knowledge base, with a focus on enhancing incident resolution workflows.
Seniority level
Not Applicable
Employment type
Full-time
Job function
Information Technology
Industries
Manufacturing
#J-18808-Ljbffr