Test Yantra

SOC Analyst L2, German Speaker

Test Yantra

contract

Posted on:

Location Type: Office

Location: KrakowPoland

Visit company website

Explore more

AI Apply
Apply

About the role

  • Perform detailed analysis of escalated security alerts and incidents
  • Correlate events across SIEM data sources to validate threats
  • Execute response actions using approved response scenarios and playbooks
  • Conduct false‑positive analysis and recommend detection tuning
  • Prepare incident analysis and operational reports
  • Support threat hunting and IOC‑based investigations

Requirements

  • 4-7 years of hands‑on experience in security monitoring and incident investigation
  • Strong experience with SIEM‑driven investigations and multi‑source log correlation
  • Ability to independently investigate escalated alerts and validate true incidents
  • Experience executing response actions and containment steps using defined playbooks
  • Capability to identify detection gaps and recommend tuning improvements
  • Confidence guiding L1 analysts during live investigations
  • Qualification preference: Bachelor’s in Computer Science, IT, Cybersecurity, or equivalent
  • Certification preference: Security+ / CEH / Blue Team equivalent, Splunk Enterprise Certified Admin
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
security monitoringincident investigationSIEMlog correlationthreat huntingIOC-based investigationsdetection tuningincident analysisoperational reporting
Soft Skills
independent investigationguiding analystsanalytical skillscommunication skills
Certifications
Security+CEHSplunk Enterprise Certified Admin