CFC Inc
Security Analyst
Department:
Service, Delivery & Support
Employment Type:
Permanent - Full Time
Location:
US - Texas
Reporting To:
Nick Dunbar
Description
About the Role
The Level 2 Analyst plays a key role in the Security Operations Center (SOC), conducting investigations, validating detections, and responding to potential threats across customer environments. You will analyze alerts, escalate complex incidents, and contribute to improving detection logic and response workflows. Level 2 Analysts are trusted problem-solvers who bridge day-to-day operations with continuous improvement efforts.
Key Responsibilities Investigate and respond to security alerts escalated from Level 1 analysts. Perform in-depth triage and correlation of endpoint, network, and cloud security data. Identify false positives, validate true incidents, and escalate when necessary. Assist in developing and tuning detection logic across SIEM, EDR, and XDR tools. Document findings, remediation steps, and lessons learned in case records. Support incident response and containment activities in collaboration with senior analysts. Contribute to playbook refinement and automation opportunities within SOC tooling. Required Qualifications
2-4 years of experience in SOC operations, threat analysis, or incident response. Strong understanding of SIEM and EDR technologies and core detection principles. Familiarity with Windows, macOS, and Linux security event analysis. Solid investigative, analytical, and written communication skills. Ability to manage multiple alerts and cases in a fast-paced environment. Preferred Qualifications
Bachelor's degree in Cybersecurity, Information Technology, or a related field. Experience with tools such as SentinelOne, Splunk, or Microsoft Defender. Certifications such as CompTIA Security+, CySA+, GCIH, or equivalent. Knowledge of MITRE ATT&CK, common attack techniques, and basic scripting (Python, PowerShell, etc.). Exposure to cloud platforms (AWS, Azure, GCP) and their security monitoring features.
Why Solis?
Solis delivers global managed detection and response services, built on integrity, teamwork, and continuous improvement. You'll join a collaborative, mission-driven SOC where your analysis directly contributes to protecting our clients from emerging threats
Department:
Service, Delivery & Support
Employment Type:
Permanent - Full Time
Location:
US - Texas
Reporting To:
Nick Dunbar
Description
About the Role
The Level 2 Analyst plays a key role in the Security Operations Center (SOC), conducting investigations, validating detections, and responding to potential threats across customer environments. You will analyze alerts, escalate complex incidents, and contribute to improving detection logic and response workflows. Level 2 Analysts are trusted problem-solvers who bridge day-to-day operations with continuous improvement efforts.
Key Responsibilities Investigate and respond to security alerts escalated from Level 1 analysts. Perform in-depth triage and correlation of endpoint, network, and cloud security data. Identify false positives, validate true incidents, and escalate when necessary. Assist in developing and tuning detection logic across SIEM, EDR, and XDR tools. Document findings, remediation steps, and lessons learned in case records. Support incident response and containment activities in collaboration with senior analysts. Contribute to playbook refinement and automation opportunities within SOC tooling. Required Qualifications
2-4 years of experience in SOC operations, threat analysis, or incident response. Strong understanding of SIEM and EDR technologies and core detection principles. Familiarity with Windows, macOS, and Linux security event analysis. Solid investigative, analytical, and written communication skills. Ability to manage multiple alerts and cases in a fast-paced environment. Preferred Qualifications
Bachelor's degree in Cybersecurity, Information Technology, or a related field. Experience with tools such as SentinelOne, Splunk, or Microsoft Defender. Certifications such as CompTIA Security+, CySA+, GCIH, or equivalent. Knowledge of MITRE ATT&CK, common attack techniques, and basic scripting (Python, PowerShell, etc.). Exposure to cloud platforms (AWS, Azure, GCP) and their security monitoring features.
Why Solis?
Solis delivers global managed detection and response services, built on integrity, teamwork, and continuous improvement. You'll join a collaborative, mission-driven SOC where your analysis directly contributes to protecting our clients from emerging threats