[< BACK]
// POSTED: Apr 15, 2026

Experienced L2 Security Operations Center Analyst for Remote 3rd Shift Position with Advanced Threat Analysis and Mitigation Expertise

APPLY NOW
Introduction to the Role and CompanyJoin our dynamic team as an experienced L2 Security Operations Center (SOC) Analyst, where you will play a critical role in protecting our clients' security postures through advanced threat analysis and mitigation strategies. This is a unique opportunity to bring your passion and expertise to a remote, 12-month contract position, offering the flexibility of working from home and a competitive salary reflecting your skills and experience. Our company is at the forefront of cybersecurity, dedicated to providing innovative solutions to combat evolving threats. We are seeking a highly skilled and motivated individual to contribute to our thriving team, working collaboratively to drive success and make a difference in the cybersecurity landscape.Job OverviewThis L2 SOC Analyst position is designed for a skilled professional with a strong and diverse skillset in cybersecurity, particularly in areas such as threat analysis, incident response, and security monitoring. The role involves working on a 10-hour shift, 4 days a week, from Thursday to Sunday, on the 3rd shift. As a key member of our Security Operations Center, you will be responsible for conducting advanced technical investigations, analyzing network traffic, handling forensic and malware analysis, and providing remediation advice to improve customer security postures.Key Responsibilities• Conduct advanced technical investigations for critical incidents, focusing on specific analysis and fast remediation advice to enhance customer security postures.• Analyze infected hosts or network traffic to identify attacker activity, utilizing your in-depth technical knowledge to inform your analysis.• Handle specific forensic and malware analysis, as well as complex log analysis requests, to support incident response efforts.• Perform event correlation reviews through incoming data feeds, ticketing systems, and security alert mechanisms to identify potential security threats.• Provide context on complex security incidents from customer and other available resources, collecting and assembling data, as well as contributing to technical reports.• Utilize your technical expertise to design procedures for the detection of threat actor behavior and develop standard technical procedures (runbooks) for the Security Monitoring team.• Perform Event Stream tuning using internal tools, metrics, and experience, involving key security concepts for systems efficiency.• Review security-related events, assess their risk and validity based on available network, endpoint, and global threat intelligence information, and make recommendations for mitigation.• Research and apply MITRE Telecommunication&CK and NIST framework-aligned strategies to the customer's environment, ensuring compliance and best practices in cybersecurity.Essential QualificationsTo be successful in this role, you will need to possess a combination of education, experience, and skills that align with the responsibilities outlined above. Essential qualifications include:• A strong foundation in cybersecurity principles, including threat analysis, incident response, and security monitoring.• Experience working in a Security Operations Center (SOC) or similar environment, with a focus on advanced threat analysis and mitigation.• In-depth technical knowledge of network protocols, operating systems, and cybersecurity technologies.• Ability to analyze complex security incidents, identify root causes, and provide effective remediation advice.• Excellent communication and collaboration skills, with the ability to work effectively in a remote team environment.• Strong problem-solving skills, with the ability to think critically and outside the box.Preferred QualificationsWhile not essential, the following qualifications are highly desirable and will be considered an asset for candidates applying for this role:• Relevant certifications in cybersecurity, such as CompTIA Security+, CISSP, or CEH.• Experience with security information and event management (SIEM) systems, threat intelligence platforms, and other cybersecurity tools.• Knowledge of cloud security, containerization, and microsegmentation.• Familiarity with agile development methodologies and version control systems such as Git.• Experience working in a fast-paced, dynamic environment, with the ability to adapt to changing priorities and deadlines.Skills and CompetenciesTo excel in this role, you will need to possess a range of skills and competencies that enable you to analyze complex security threats, communicate effectively with stakeholders, and collaborate with team members to drive success. Key skills and competencies include:• Technical expertise: In-depth knowledge of cybersecurity principles, network protocols, operating systems, and cybersecurity technologies.• Analytical skills: Ability to analyze complex security incidents, identify root causes, and provide effective remediation advice.• Communication skills: Exce Apply
Interested in this role?Apply on iHire