Summary:
An L2 SOC Analyst in a 5G SOC will perform in-depth analysis and response to security incidents, ensuring the continued integrity and security of 5G networks.
Principal Functions and Key Responsibilities:
As a Level 2 SOC Security Analyst, also known as an L2 SOC Analyst, you will be responsible for:
- Conducting detailed analysis of security incidents escalated by L1 analysts.
- Performing root cause analysis and advanced investigations to determine the extent of the threat.
- Responding to and contain security incidents, minimizing their impact on network operations.
- Using advanced security tools and techniques to analyze and mitigate threats.
- Collaborating with other teams to implement security improvements and preventative measures.
- Documenting and report on incident findings and actions taken.
- Recommendations on incident response playbooks and procedures specific to 5G networks.
- Knowledge of 4G/5G Protocols for RAN & Core.
- Providing training and guidance to L1 SOC analysts.
- Keeping up to date with the latest threats, vulnerabilities, and technologies in the 5G space.
- Maintaining 5G SOC operations lab.
- Ensuring the continued integrity and security of 5G RAN & Core networks.
Qualifications:
- Bachelor’s degree in computer science, Information Security, or a related field.
- Strong Understanding of TCP/IP protocol and OSI Seven Layers Model and various types of Networks.
- Strong understanding of cybersecurity and 5G technology.
- Experience with a range of security tools, including SIEM, SOAR, Intrusion detection/prevention systems (IDS/IPS), and forensic tools.
- Advanced analytical and problem-solving skills.
- Ability to conduct detailed advanced investigations and malware analysis.
- Strong communication and documentation skills.
- Ability to work under pressure and respond to incidents promptly.
- Industry certifications such as CCSP, CISSP, or similar are preferred.
- Experience in 4G/5G Security Operations.
- Experience working in ISP’s on 4G/5G technologies is a plus.
- Experience working on Splunk and MS Sentinel.
- Experience in IT and OT environments.
Certifications: CompTIA Security+, CSA (Certified SOC Analyst), CCNA CyberOPs, Cybersecurity Analyst (CySA+), GIAC Certified Incident Handler (GCIH), Blue Team Level 1 (BTL1), MITRE Attack Defender (MAD) , MS Sentinel and Splunk Certifications (Preferred).