HamburgerMenu
hirist

L2 Security Incident Response Analyst - SIEM/SOAR

Henson Group
Multiple Locations
2 - 4 Years
star-icon
3.8white-divider10+ Reviews

Posted on: 13/01/2026

Job Description

Description :

Job Title : Security Incident Response Analyst (Level 2)

Department : Cybersecurity

Position Type : Full Time

Location : Remote

Working Hours : Rotational Shifts

Company Overview :

ALIANDO, is an award-winning Azure Expert Managed Service solutions company focused on selling and deploying Microsoft technologies for U.S. and international companies. For over 20 years, Microsoft and its partners have recommended ALIANDO, for licensing, consulting, and managed services to corporations large and small.

The company offers competitive pay and comprehensive employee benefits, including health insurance, fitness allowances, work-from-home allowances, paid maternity and parental leave, and generous PTO.

At ALIANDO, we aim to unleash the potential of people and technology. Our company was built around the idea that there is no success without team success. We foster a culture of inclusion and fairness where diverse interests, experiences, and backgrounds are celebrated. We strive to empower and unleash the potential of everyone to ensure that every employee has a path to success. We're in it together to make life better for each other, our customers, our partners, and our communities.

Specifically, the Security Incident Response Analyst, Level 2 will :

- Investigate and analyze incidents to determine scope, impact, root cause, and response actions.

- Perform digital forensics to collect evidence, analyze malware, logs, network traces, etc.

- Execute containment, eradication, and recovery procedures.

- Directly coordinate with network, systems, cloud, and application teams during incident response.

- Develop and improve incident response playbooks and SOC processes.

- Lead the handling of high's everity incidents and ensure proper escalation paths.

- Create and deliver detailed incident reports including lessons learned.

- Participate in threat?hunting activities and proactive detection improvements.

- Support training and mentoring of Level 1 analysts.

Job Requirements :

- Bachelors degree in Engineering, Computer Science, or related field.

- 24 years of experience in Incident Response, SOC Operations, or Digital Forensics.

- Strong knowledge of SIEM/SOAR, EDR/XDR, threat intelligence, and log analysis.

- Experience in network, endpoint, and cloud incident analysis.

- Ability to manage complex incidents in high?pressure environments.

- CEH, OSCP, CHFI, ECIH, CISSP (any combination valued).

- Hands?on experience with Microsoft Defender, Sentinel, Entra ID Protection, etc.


info-icon

Did you find something suspicious?

Similar jobs that you might be interested in