×
Register Here to Apply for Jobs or Post Jobs. X

SOC Analyst II

Job in San Jose, Santa Clara County, California, 95199, USA
Listing for: Apex Systems
Full Time, Seasonal/Temporary position
Listed on 2026-03-06
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Salary/Wage Range or Industry Benchmark: 45 USD Hourly USD 45.00 HOUR
Job Description & How to Apply Below

Type: 6-12 month contract

Job#: 3023513

Title: SOC Analyst

Location: San Jose, CA 95134

Schedule: Onsite M-F 8am-5pm PST

Pay: up to $45/hr W2

Apply Here: Please send your updated resume and availability for a call to Emma at  . (I am on East Coast, so my availability is 6am-2pm PST)

Job Overview

The SOC Analyst II is a mid-level cybersecurity professional responsible for monitoring, analyzing, and responding to security events and incidents within a Security Operations Center (SOC). This role plays a critical part in maintaining the organization’s security posture by leveraging SIEM and EDR platforms, primarily Microsoft Sentinel and Splunk to detect, investigate, and remediate security threats. The analyst will perform advanced triage, support incident containment, collaborate with senior analysts on complex investigations, and contribute to the continuous improvement of SOC processes, playbooks, and documentation.

Required Qualifications & Experience
  • 5–6 years of experience working in a SOC or security operations role
  • Hands‑on experience with SIEM platforms, specifically Microsoft Sentinel and Splunk
  • Working knowledge of EDR technologies, with preference for Sentinel One
  • Strong understanding of:
    • Network fundamentals (TCP/IP, DNS, HTTP/S)
    • Windows and Unix/Linux operating systems
    • Common attack vectors, malware behavior, and threat actor techniques
  • Experience handling security incidents across endpoints, networks, and cloud environments
  • Familiarity with IT service management and operational frameworks such as ITIL
  • Ability to work in a 24x7 SOC environment and manage multiple incidents simultaneously
  • Strong written and verbal communication skills with the ability to clearly document and explain technical findings
Key Responsibilities Security Monitoring & Incident Response
  • Monitor and analyze security alerts generated from SIEM and EDR platforms, with primary focus on Microsoft Sentinel and Splunk
  • Perform detailed triage and investigation of security events to determine severity, scope, and potential impact
  • Respond to security incidents by following established incident response procedures, including containment, eradication, and recovery activities
  • Escalate complex or high‑risk incidents to senior (L3) analysts or incident response teams with clear documentation and analysis
SIEM & EDR Operations
  • Tune and manage SIEM alerts to reduce false positives and improve detection fidelity
  • Investigate endpoint‑related alerts and incidents using EDR tools, with preference for Sentinel One EDR
  • Assist in the deployment, configuration, and maintenance of SOC security tools, including SIEM, EDR, and endpoint protection platforms
  • Correlate data across multiple security sources to identify attack patterns and indicators of compromise (IOCs)
Documentation & Reporting
  • Document incidents, investigation findings, and remediation steps in ticketing and case management systems
  • Create and maintain SOPs, playbooks, and response documentation based on operational experience
  • Prepare incident reports and present findings to senior analysts, SOC leadership, or adjacent security teams
Collaboration & Continuous Improvement
  • Work closely with Tier 1 analysts to provide guidance, mentorship, and escalation support
  • Collaborate with core security teams, IT operations, and compliance stakeholders to support regulatory and audit requirements
  • Stay current with emerging threats, vulnerabilities, and cybersecurity best practices through ongoing research and training
  • Participate in SOC shift handovers, post‑incident reviews, and continuous process improvement initiatives
EEO Employer Statement

Apex Systems is an equal opportunity employer. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law.

Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Benefits Department at  or . (Do not submit resumes or solicit consultants to this email address).

United Healthcare creates and publishes the Transparency in Coverage Machine‑Readable Files on behalf of Apex Systems.

#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary