




Level 2 SOC Analyst Title: Level 2 SOC Analyst Location: Madrid, on site Job type: Full\-Time Permanent Salary: Negotiable / DOE **About Us** Integrity360 is the largest independent cyber security provider in Europe, with a growing international presence spanning the UK, Ireland, mainland Europe, Africa and the Caribbean. With over 700 employees, across 12 locations, and six Security Operations Centres (SOCs)—including locations in Dublin, Sofia, Stockholm, Madrid, Rome and Cape Town—we support more than 2,500 clients across a wide range of industries. Over 80% of our team are technical experts, focused on helping clients proactively identify, protect, detect and respond to threats in an ever\-evolving cyber landscape. Our security\-first approach positions cyber resilience as a business enabler, empowering organisations to operate with confidence. At Integrity360, people come first. We invest heavily in learning, development and progression, fostering a dynamic culture where innovation, collaboration and continuous growth are at the heart of what we do. If you're ready to take your cyber security career to the next level, we’d love to hear from you. **Job Role / Responsibilities** As a **L2** **SOC Analyst**, you will act as a core investigator responsible for deep\-dive analysis, incident ownership, and advanced threat handling. You will mentor L1 SOC analysts within the team. This role is part of a dedicated SOC team , providing analysts with the opportunity to operate within a highly mature security environment, gain exposure to advanced technologies and complex threat scenarios, and develop deep domain expertise in financial services security operations. **Primary Duties/Responsibilities include:** * Lead **investigation** of confirmed and high\-risk security incidents * Perform **deep\-dive analysis** using: + Microsoft Sentinel + Microsoft Defender Suite + Trellix + Zscaler * Apply **threat intelligence** and attacker **TTP** analysis using: + MITRE ATT\&CK + Cyber Kill Chain + NIST IR Lifecycle * Produce **high\-quality incident reports** with actionable recommendations * Coordinate **containment** and **remediation** actions with engineering, infrastructure, and client teams * Provide technical **guidance** and **mentorship** to Tier 1 analysts * Participate in **continuous improvement** of SOC processes, playbooks, and detection quality * Maintain exceptional **communication** with client stakeholders during active incidents * Perform ad\-hoc analysis of varied logs, identifying anomalies in customer environments. **Desired Skills** * Minimum **1 year experience** in a SOC Tier 1 or security analyst role * Advanced investigative and analytical capability * Strong understanding of modern attack techniques, threat actors, and detection methodologies * Proven experience with SIEM, EDR/XDR, identity, email and cloud security tooling * Excellent technical documentation and communication skills * Ability to manage multiple complex incidents simultaneously * Ability to perform event correlation, host/ network threat analysis. Ability to manage multiple incidents and make effective decisions under high pressure environment. * **Certifications/Qualifications (preferred but not required)** * Security industry certifications: SEC\+, CYSA\+, Net\+, SC\-200,AZ\-500,AZ\-900,Splunk Power user * A working knowledge of Intrusion Prevention System (IPS), SIEM, SOAR \& DLP is a nice to have. * Experience working with threat hunting tools is nice to have. \#LI\-PM2


