Job Description
StickmanCyber is seeking an experienced SOC Analyst L2 to join our dynamic Security Operations team. This remote role is ideal for a motivated cybersecurity professional with strong DFIR capabilities and hands-on experience with SIEM (preferably Google Chronicle) and EDR tools. If you’re ready to contribute to a high-performing 24/7 security environment, we want to hear from you!
Responsibilities:
- Monitor and analyze security alerts from SIEM and EDR systems
- Conduct incident triage, investigation, and root cause analysis
- Perform digital forensics and incident response (DFIR) tasks
- Collaborate with the MSSP team to ensure effective threat detection and mitigation
- Provide actionable insights and contribute to threat intelligence initiatives
- Document incidents, findings, and recommendations with clear communication
Job Requirements
• 3–6 years of hands-on SOC experience
• Proficiency in Google Chronicle or similar SIEM platforms
• Strong understanding of EDR tools and MSSP environments
• Expertise in DFIR, threat hunting, and security monitoring
• Excellent communication skills
• Ability to join immediately or within 15 days
Preferred Qualifications
• Certifications such as CEH, GCIA, GCIH, or similar
• Familiarity with 24/7 SOC environments
• Experience with cloud-based security platforms
• To Apply: Send your resume with your notice period and resume.
• Note: Only shortlisted candidates will be contacted. Thank you for your patience.
About the Company
StickmanCyber is a cybersecurity services provider committed to protecting businesses from evolving digital threats. We deliver proactive security strategies and 24/7 protection through our expert SOC teams and advanced technologies.