Ensign InfoSecurity

Security Analyst (SOC Level 2)

Join Ensign InfoSecurity as a Security Analyst (SOC Level 2) to leverage ServiceNow for incident management. Requires 2-4 years in cybersecurity, SIEM expertise, and relevant certifications. Competitive salary and growth opportunities.

Department - JobBoardly X Webflow Template
Consulting
Job Level - JobBoardly X Webflow Template
Entry Level
ServiceNow Role Type:
Department - JobBoardly X Webflow Template
System Administrator
ServiceNow Modules:
Department - JobBoardly X Webflow Template
IT Service Management
Department - JobBoardly X Webflow Template
Security Operations
ServiceNow Certifications (nice to have):
Department - JobBoardly X Webflow Template
Certified System Administrator

Job description

Date - JobBoardly X Webflow Template
Posted on:
 
June 25, 2025

Security Analyst responsible for analyzing and responding to escalated alerts, conducting investigations, and providing technical guidance to Tier 1 analysts. Key responsibilities include malware analysis, log correlation, and network traffic analysis, as well as supporting proactive threat hunting initiatives and maintaining documentation of investigations and incident outcomes.

Requirements

  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field—or equivalent work experience.
  • 2–4 years of experience in a Security Operations Center or similar cybersecurity environment.
  • Experience working in an MSSP or multi-tenant environment is highly desirable.
  • Strong experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar).
  • Hands-on experience with EDR tools (e.g., CrowdStrike, SentinelOne, Microsoft Defender).
  • Familiarity with NDR and SOAR platforms is a plus (e.g., Darktrace, Corelight, Cortex XSOAR).
  • Strong understanding of networking protocols, log analysis, and system administration (Windows/Linux).
  • Knowledge of malware behaviors, phishing techniques, and MITRE ATT&CK framework.
  • Experience with scripting and automation tools (e.g., Python, PowerShell) is a plus.
  • Familiarity with case management tools (e.g., Jira, ServiceNow, TheHive).
  • Certifications (preferred): CompTIA Security+, CySA+, or equivalent, GIAC certifications (e.g., GCIH, GCIA, GCFA), CEH, or vendor-specific certifications (e.g., Microsoft SC-200, CrowdStrike CCFR).

Benefits

  • Competitive salary
  • Benefits package
  • Opportunities for professional growth and development

Requirements Summary

2-4 years of experience in a Security Operations Center or similar cybersecurity environment, strong experience with SIEM platforms, and strong understanding of networking protocols and log analysis