Redshift is looking for a SOC Analyst L2 (M/F) to join its team.
About the role
We are looking for a SOC Analyst L2 to join our security operations team. This role will be responsible for monitoring, detecting, and responding to security incidents in real time, ensuring the protection of the organization’s and our clients’ assets and data.
Responsibilities
Continuously monitor security alerts, events, and logs in SIEM tools and other cybersecurity platforms;
Identify, analyze, and respond to security incidents according to defined procedures;
Collaborate with internal teams and clients in the investigation and mitigation of threats;
Contribute to the continuous improvement of processes, playbooks, and security policies;
Participate in simulations, incident response tests, and other hardening and awareness activities;
Produce technical and management reports related to events and incidents.
Previous experience in similar roles, preferably in SOC or MSSP environments;
Solid knowledge of networks, operating systems (Windows/Linux), and log analysis;
Familiarity with tools such as SIEM (e.g., Splunk, QRadar, Elastic), EDR, IDS/IPS, firewalls;
Strong analytical skills, attention to detail, and a high sense of responsibility;
Good command of spoken and written English.
We value
Certifications such as CompTIA Security+, CEH, GCIH, or other cybersecurity-related certifications;
Experience with scripting (Python, Bash, PowerShell);
Knowledge in threat hunting, threat intelligence, or forensic analysis.
Continuous training plan and support for professional certification;
Flexible working hours – hybrid model;
Health insurance