More jobs:
Security Operations Center; SOC Analyst – Level 2; L2
Job in
Riyadh, Riyadh Region, Saudi Arabia
Listed on 2026-01-11
Listing for:
Accenture
Full Time
position Listed on 2026-01-11
Job specializations:
-
IT/Tech
Cybersecurity, Security Manager
Job Description & How to Apply Below
Job Summary
The SOC L2 Analyst provides advanced security monitoring, incident investigation, and response across client environments. This role requires strong analytical skills, hands‑on experience with SIEM/EDR platforms, and the ability to manage escalated incidents from identification through remediation. The analyst also interfaces with various technical teams, drives improvements in SOC processes, and ensures defensive measures are aligned with emerging threats
Key Responsibilities Security Monitoring & Incident Handling- Lead the investigation of security incidents escalated from Level 1, validating initial analysis and identifying missing or inaccurate details.
- Manage the full incident lifecycle including identification, triage, containment, remediation, and closure.
- Perform in‑depth analysis of security alerts, logs, and events across SIEM, EDR, firewall, network, and cloud telemetry.
- Conduct root‑cause analysis, document impact, and provide actionable recommendations.
- Support major incidents and complex investigations, ensuring timely and accurate escalation.
- Analyze threat campaigns, attacker tactics, techniques, and procedures (TTPs), and extract indicators of compromise.
- Identify emerging threats and assess potential impact on client environments.
- Tune detection rules, correlation logic, and use cases to enhance accuracy and reduce false positives.
- Work with SIEM platforms (such as Splunk ES, QRadar, or equivalent) for advanced event analysis and correlation.
- Utilize EDR, IDS/IPS, sandboxing tools, and other SOC technologies to perform comprehensive investigations.
- Access and interpret elevated log sources across platforms including firewalls, endpoint logs, cloud services, and DNS telemetry.
- Ensure all investigations and evidence are fully documented in case management systems.
- Prepare post‑incident analysis reports with observations, lessons learned, and improvement recommendations.
- Adhere to SOC processes, SLAs, and quality standards while contributing to their ongoing enhancement.
- Coordinate closely with internal teams including Sec Ops, Network, Cloud, Platform Engineering, and Threat Intelligence.
- Engage resolver teams to support containment or remediation activities as required.
- Communicate technical findings clearly to both technical and non‑technical stakeholders.
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×