SOC Analyst 2

Posted 2026-05-06
Remote, USA Full-time Immediate Start
    Mercor is hiring **SOC Analyst II** professionals on behalf of high-growth technology and enterprise partners to strengthen their **security operations and incident response capabilities**. This role is ideal for experienced SOC analysts who can independently investigate, respond to, and remediate security incidents across cloud, endpoint, and network environments.
  • * *

## Responsibilities

  • Monitor, triage, and investigate security alerts from **SIEM, EDR/XDR, IDS/IPS, and cloud security tools**, distinguishing real threats from false positives.
  • Perform **in-depth incident investigations**, including log analysis, endpoint inspection, network traffic analysis, and timeline reconstruction.
  • Lead response actions for confirmed incidents, including **containment, remediation, and recovery**, following established incident response playbooks.
  • Conduct **threat hunting** activities to proactively identify adversarial behavior not detected by automated tools.
  • Tune detection rules, alerts, and dashboards to improve signal quality and reduce alert fatigue.
  • Collaborate with security engineering, IT, and cloud teams to remediate vulnerabilities and improve overall security posture.
  • Maintain accurate incident documentation, reports, and post-incident reviews.
  • Mentor and support **Tier 1 SOC analysts**, providing guidance on investigations and response techniques.
  • * *

## Requirements

  • 2–4+ years of experience in a **Security Operations Center (SOC)** or incident response role.
  • Strong understanding of **networking fundamentals** (TCP/IP, DNS, HTTP/S) and common attack vectors.
  • Hands-on experience with **SIEM platforms** (e.g., Splunk, Sentinel, QRadar) and **EDR/XDR tools** (e.g., CrowdStrike, SentinelOne).
  • Proficiency in analysing **Linux and Windows** logs and system activity.
  • Experience with **cloud security monitoring** in AWS, GCP, or Azure environments.
  • Familiarity with **MITRE ATTACK**, threat actor tactics, techniques, and procedures (TTPs).
  • Basic scripting or automation skills (Python, Bash, or PowerShell) preferred.
  • Strong written and verbal communication skills for incident reporting and cross-team collaboration.
  • * *

## Why Join

  • Work with leading companies strengthening their **security operations and cyber defense** capabilities.
  • Take ownership of **end-to-end incident investigations** and response actions.
  • Collaborate with experienced security engineers, threat hunters, and cloud teams.
  • Gain exposure to modern **cloud, endpoint, and detection engineering** environments.
  • Join a global network of vetted security professionals through Mercor.

Similar Jobs

Back to Job Board