About the role
Join NebulaForge's Security Operations Center as a Tier 2 analyst. You will triage and investigate security incidents, hunt for threats in our Azure environment, and mentor Tier 1 analysts.
Responsibilities
- Investigate escalated alerts from Tier 1 and SIEM detections
- Perform threat hunting across Azure and M365 logs using KQL
- Write and tune detection rules in Microsoft Sentinel
- Lead incident response for medium-severity events
- Mentor Tier 1 analysts and maintain SOC playbooks
What you'll bring
- 3+ years SOC or incident response experience
- Proficiency with Microsoft Sentinel and Defender XDR
- Understanding of MITRE ATT&CK framework
- Experience with KQL for threat hunting
- Knowledge of cloud attack techniques (Azure, M365)
- Security certifications: SC-200, CompTIA CySA+, or equivalent
Benefits
✦ 24/5 SOC (no overnight shifts)
✦ Dedicated lab environment for skill development
✦ Security conference budget
✦ Career path to SOC Manager or IR Specialist
✦ Competitive compensation with shift allowance