Job Openings Security Analyst – SOC Operations (Level 2)

About the job Security Analyst – SOC Operations (Level 2)

The Role

The Security Analyst – SOC Operations (Level 2) is responsible for advanced monitoring, investigation, and response to cybersecurity incidents within a Private 5G Security Operations Center. This role performs in-depth analysis of incidents escalated from Level 1, leads root cause investigations, and supports the continuous security and resilience of 4G/5G RAN and Core networks. The position plays a critical role in strengthening detection capabilities, improving response processes, and ensuring uninterrupted and secure network operations.

Duties and Responsibilities

  • Conduct detailed analysis of security incidents escalated by L1 SOC analysts.

  • Perform root cause analysis and advanced investigations to determine scope, impact, and threat vectors.

  • Respond to, contain, and remediate security incidents while minimizing operational and service impact.

  • Utilize advanced security tools and techniques to analyze, investigate, and mitigate threats.

  • Collaborate with internal and external teams to implement corrective and preventive security controls.

  • Document incident findings, actions taken, and lessons learned in accordance with SOC procedures.

  • Provide recommendations for improving incident response playbooks and 5G-specific security procedures.

  • Maintain strong working knowledge of 4G/5G protocols, signaling flows, and architectures for RAN and Core.

  • Provide technical guidance, mentoring, and on-the-job training to L1 SOC analysts.

  • Monitor evolving threat landscapes, vulnerabilities, and technologies impacting 5G environments.

  • Support and maintain the 5G SOC operations lab.

  • Ensure the ongoing integrity, availability, and security of 5G RAN and Core network environments.

Requirements

  • Bachelors degree in Computer Science, Information Security, or a related discipline.

  • Strong understanding of TCP/IP, OSI Seven Layer Model, and diverse network architectures.

  • Strong knowledge of cybersecurity principles and 4G/5G technologies.

  • Hands-on experience with security tools including SIEM, SOAR, IDS/IPS, and forensic analysis tools.

  • Proven ability to conduct advanced investigations, including malware analysis and threat containment.

  • Experience working in 4G/5G Security Operations environments.

  • Experience in ISP or telecom environments is a strong advantage.

  • Hands-on experience with Splunk and Microsoft Sentinel.

  • Experience across IT and OT environments.

  • Strong analytical, problem-solving, documentation, and communication skills.

  • Ability to work under pressure and respond effectively to security incidents.

  • Industry certifications are preferred, including CompTIA Security+, CSA, CCNA CyberOps, CySA+, GCIH, BTL1, MITRE ATT&CK Defender (MAD), and Splunk / Microsoft Sentinel certifications.