What are the responsibilities and job description for the SOC Analyst Tier 2 - 100% onsite position at Jobs via Dice?
Job Title:
Tier 2 SOC Analyst
Location:
Charlotte, NC
Duration:
6 Month Contract to Hire
Position Overview:
Tier-2 Senior SOC Analyst focuses on improving detection fidelity and response efficiency by tuning SIEM detections, developing automation in SOAR, and performing advanced threat analytics to identify and contain sophisticated attacks.
Key Responsibilities
Triage escalated alerts from Tier-1 and validate true/false positives and proper response
Correlate multi-source telemetry (EDR, SIEM, DNS/proxy, firewall, IAM, cloud logs) to scope incidents
Produce clear incident timelines, findings, and recommended containment actions; coordinate escalations to IR/forensics
Design, build, and maintain SOAR playbooks for alert enrichment, containment steps, and standardized triage
Integrate tools/APIs (SIEM, EDR, ticketing, threat intel, IAM) to automate evidence collection and response
Conduct proactive hunts using MITRE ATT&CK mapping and intelligence-driven analytics
Required Technical Skills
3 years of relevant experience or equivalent combination of education and work experience
Strong hands-on SIEM investigation and detection content development (correlation rules, query-based alerts)
Experience tuning detection logic and measuring detection quality (false positive reduction, alert fatigue control)
Incident investigation experience across endpoint, identity, network, email, and cloud telemetry
Working knowledge of adversary behaviors and kill chain concepts; ability to reason from artifacts to hypotheses
Familiarity with malware triage basics (hash reputation, sandboxing, simple static indicators)
Cloud security telemetry analysis (audit logs, resource changes, identity events)
6:30am -4:30pm EST Sun-Wednesday
6:30am-4:30pm EST Wednesday-Saturday
12:30pm-10:30pm Sunday-Wednesday
12:30pm-10:30pm Wednesday-Sunday
Tier 2 SOC Analyst
Location:
Charlotte, NC
Duration:
6 Month Contract to Hire
Position Overview:
Tier-2 Senior SOC Analyst focuses on improving detection fidelity and response efficiency by tuning SIEM detections, developing automation in SOAR, and performing advanced threat analytics to identify and contain sophisticated attacks.
Key Responsibilities
Triage escalated alerts from Tier-1 and validate true/false positives and proper response
Correlate multi-source telemetry (EDR, SIEM, DNS/proxy, firewall, IAM, cloud logs) to scope incidents
Produce clear incident timelines, findings, and recommended containment actions; coordinate escalations to IR/forensics
Design, build, and maintain SOAR playbooks for alert enrichment, containment steps, and standardized triage
Integrate tools/APIs (SIEM, EDR, ticketing, threat intel, IAM) to automate evidence collection and response
Conduct proactive hunts using MITRE ATT&CK mapping and intelligence-driven analytics
Required Technical Skills
3 years of relevant experience or equivalent combination of education and work experience
Strong hands-on SIEM investigation and detection content development (correlation rules, query-based alerts)
Experience tuning detection logic and measuring detection quality (false positive reduction, alert fatigue control)
Incident investigation experience across endpoint, identity, network, email, and cloud telemetry
Working knowledge of adversary behaviors and kill chain concepts; ability to reason from artifacts to hypotheses
Familiarity with malware triage basics (hash reputation, sandboxing, simple static indicators)
Cloud security telemetry analysis (audit logs, resource changes, identity events)
6:30am -4:30pm EST Sun-Wednesday
6:30am-4:30pm EST Wednesday-Saturday
12:30pm-10:30pm Sunday-Wednesday
12:30pm-10:30pm Wednesday-Sunday