Security Operations Center Analyst 2/3 – France

Security Operations Center Analyst 2/3

NEVERHACK

France

Postuler

NEVERHACK: Your One-Stop Cybersecurity Solution

At NEVERHACK , we are the one-stop shop for cybersecurity .

What does this mean in practice? We protect businesses and individuals through a comprehensive range of solutions: technical expertise, a cutting-edge SOC, training programs, security products, artificial intelligence , and more.

Our mission is clear: to create a safer digital world . And how do we achieve this? Through our people —a team that challenges the norms of cybersecurity every day and takes real action to protect everyone.

Driven by our ambitions and strong convictions , our team has grown by more than 1,200 employees worldwide in just one year . Today, we aim to deepen our expertise and expand our global footprint beyond our current presence in 10 countries . 🚀

We Are Looking for a SOC Analyst Level 2/3

We are seeking a highly skilled SOC Analyst Level 2/3 with expertise in EDR solutions to join our Security Operations Center (SOC) and support an international client.

Expertise in ELK and Microsoft Sentinel is essential! 🚀

Key Responsibilities :

Contribute to the architecture of the monitoring infrastructure : technology migration, technology selection, and technical architecture documentation.

Monitor and analyze security events using XDR and SIEM solutions (ELK, Microsoft Sentinel). ✅ Triage, investigate, and remediate security alerts and incidents

Conduct threat hunting activities to detect advanced threats.

Manage and optimize XDR rules, playbooks, and automation workflows.

Collaborate with Threat Intelligence teams to enhance detection capabilities.

Support incident response efforts in alignment with security policies.

Requirements :

3+ years of experience in a SOC environment (Level 2 or 3) .

Strong expertise in SIEM, XDR, and EDR solutions and security automation tools (preferably ELK and Microsoft Sentinel ).

Hands-on experience in threat detection, incident response, and remediation .

Proficiency in analyzing logs, network traffic, and security alerts .

Familiarity with the MITRE ATT&CK framework and Threat Intelligence methodologies .

Experience in writing and managing detection rules, playbooks, and automated workflows . ✅ Fluent in English (spoken and written) .

Ability to work in a global, remote team environment .

Security certifications (GCIA, GCIH, CEH, CISSP, CySA+, Azure/AWS Security) are a plus . 🚀

4o

Postuler

Voir tous les emplois