SOC Analyst II
Listed on 2026-03-06
-
IT/Tech
Cybersecurity, Security Manager
Type: 6-12 month contract
Job#: 3023513
Title: SOC Analyst
Location: San Jose, CA 95134
Schedule: Onsite M-F 8am-5pm PST
Pay: up to $45/hr W2
Apply Here: Please send your updated resume and availability for a call to Emma at . (I am on East Coast, so my availability is 6am-2pm PST)
Job OverviewThe SOC Analyst II is a mid-level cybersecurity professional responsible for monitoring, analyzing, and responding to security events and incidents within a Security Operations Center (SOC). This role plays a critical part in maintaining the organization’s security posture by leveraging SIEM and EDR platforms, primarily Microsoft Sentinel and Splunk to detect, investigate, and remediate security threats. The analyst will perform advanced triage, support incident containment, collaborate with senior analysts on complex investigations, and contribute to the continuous improvement of SOC processes, playbooks, and documentation.
Required Qualifications & Experience- 5–6 years of experience working in a SOC or security operations role
- Hands‑on experience with SIEM platforms, specifically Microsoft Sentinel and Splunk
- Working knowledge of EDR technologies, with preference for Sentinel One
- Strong understanding of:
- Network fundamentals (TCP/IP, DNS, HTTP/S)
- Windows and Unix/Linux operating systems
- Common attack vectors, malware behavior, and threat actor techniques
- Experience handling security incidents across endpoints, networks, and cloud environments
- Familiarity with IT service management and operational frameworks such as ITIL
- Ability to work in a 24x7 SOC environment and manage multiple incidents simultaneously
- Strong written and verbal communication skills with the ability to clearly document and explain technical findings
- Monitor and analyze security alerts generated from SIEM and EDR platforms, with primary focus on Microsoft Sentinel and Splunk
- Perform detailed triage and investigation of security events to determine severity, scope, and potential impact
- Respond to security incidents by following established incident response procedures, including containment, eradication, and recovery activities
- Escalate complex or high‑risk incidents to senior (L3) analysts or incident response teams with clear documentation and analysis
- Tune and manage SIEM alerts to reduce false positives and improve detection fidelity
- Investigate endpoint‑related alerts and incidents using EDR tools, with preference for Sentinel One EDR
- Assist in the deployment, configuration, and maintenance of SOC security tools, including SIEM, EDR, and endpoint protection platforms
- Correlate data across multiple security sources to identify attack patterns and indicators of compromise (IOCs)
- Document incidents, investigation findings, and remediation steps in ticketing and case management systems
- Create and maintain SOPs, playbooks, and response documentation based on operational experience
- Prepare incident reports and present findings to senior analysts, SOC leadership, or adjacent security teams
- Work closely with Tier 1 analysts to provide guidance, mentorship, and escalation support
- Collaborate with core security teams, IT operations, and compliance stakeholders to support regulatory and audit requirements
- Stay current with emerging threats, vulnerabilities, and cybersecurity best practices through ongoing research and training
- Participate in SOC shift handovers, post‑incident reviews, and continuous process improvement initiatives
Apex Systems is an equal opportunity employer. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law.
Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Benefits Department at or . (Do not submit resumes or solicit consultants to this email address).
United Healthcare creates and publishes the Transparency in Coverage Machine‑Readable Files on behalf of Apex Systems.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).