
SOC Analyst L2, German Speaker
Test Yantra
contract
Posted on:
Location Type: Office
Location: Krakow • Poland
Visit company websiteExplore more
Tech Stack
About the role
- Perform detailed analysis of escalated security alerts and incidents
- Correlate events across SIEM data sources to validate threats
- Execute response actions using approved response scenarios and playbooks
- Conduct false‑positive analysis and recommend detection tuning
- Prepare incident analysis and operational reports
- Support threat hunting and IOC‑based investigations
Requirements
- 4-7 years of hands‑on experience in security monitoring and incident investigation
- Strong experience with SIEM‑driven investigations and multi‑source log correlation
- Ability to independently investigate escalated alerts and validate true incidents
- Experience executing response actions and containment steps using defined playbooks
- Capability to identify detection gaps and recommend tuning improvements
- Confidence guiding L1 analysts during live investigations
- Qualification preference: Bachelor’s in Computer Science, IT, Cybersecurity, or equivalent
- Certification preference: Security+ / CEH / Blue Team equivalent, Splunk Enterprise Certified Admin
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
security monitoringincident investigationSIEMlog correlationthreat huntingIOC-based investigationsdetection tuningincident analysisoperational reporting
Soft Skills
independent investigationguiding analystsanalytical skillscommunication skills
Certifications
Security+CEHSplunk Enterprise Certified Admin