Job Description
CyberGate Defense is expanding its Security Operations Center (SOC) and is on the hunt for Level 2 SOC Analysts with strong Splunk expertise. We are looking for cybersecurity professionals with a deep understanding of threat detection and incident response, who are ready to hit the ground running and can join within 30 days of offer acceptance.
Responsibilities:
- Perform in-depth analysis of security incidents escalated by L1 analysts
- Utilize Splunk for advanced threat hunting, log correlation, and forensic investigation
- Lead incident response efforts and coordinate with stakeholders
- Develop and refine playbooks, detection use cases, and reporting workflows
- Mentor L1 analysts and assist in training activities
- Collaborate across teams to enhance security posture
Job Requirements
• Strong experience with Splunk (search queries, dashboards, correlation rules)
• Solid background in threat intelligence, SIEM, and incident response
• Strong understanding of MITRE ATT&CK framework, log analysis, and malware behavior
• Excellent analytical, communication, and documentation skills
• Ability to work in a fast-paced SOC environment and rotational shifts
Preferred Qualifications
• Industry certifications such as Splunk Certified Power User, GCIA, GCIH, CEH, or similar
• Experience with SOAR platforms and scripting (Python preferred)
• Exposure to EDR tools, IDS/IPS, and endpoint security
• To Apply: Send your profile with Subject Line: Application for SOC Analyst (L2) Role
About the Company
CyberGate Defense is a cutting-edge cybersecurity company delivering advanced defense solutions across sectors. Our mission is to secure critical infrastructures with a highly skilled team and modern technologies. Join us and contribute to making cyberspace safer for everyone.