




**Description:** ---------------- Do you have experience as a Security Analyst N2? Are you looking for your next professional challenge? If so, don’t miss this opportunity! **Did you know us?** In 2025, myCloudDoor and Henson Group have joined forces to form ALIANDO, a global company born from the merger of two leading Cloud solution providers. This strategic integration positions us as a Leading Partner in Cloud innovation, Artificial Intelligence, and Managed Services, with a clear focus on supporting organizations through their digital transformation: Cloud Infrastructure & Modernization | FinOps | Data & AI | Cybersecurity | SAP on Azure | Business Applications: Power Platform, Dynamics 365, low-code/no-code solutions | Managed Services & Licensing. With presence across North America, Europe, the Middle East, and LATAM—and a global team of experts—we lead high-impact projects built on technologies such as Azure OpenAI, Copilot, and SAP. If you seek growth within an international, innovative, and continuously evolving environment, ALIANDO is your place. We are seeking a professional to join the SOC of one of our key clients as a Level 2 Analyst, responsible for advanced analysis, investigation, and response to security incidents, as well as participating in the optimization and activation of containment automation across security platforms. **Responsibilities:** * Advanced analysis and investigation of security alerts and incidents (L2). * Event correlation and validation of alerts generated by XSIAM. * Classification, prioritization, and escalation of incidents based on criticality. * Initial threat containment via automated playbooks and manual actions. * Participation in the design, tuning, and improvement—alongside other teams—of SOAR automations and workflows in Cortex. * Malware analysis, suspicious activity, and anomalous behavior assessment. * Collaboration with L1, L3 analysts and incident response teams. * Documentation of incidents, lessons learned, and operational improvements. * Support in hardening, tuning, and reduction of false positives. **Requirements:** * Minimum 2–3 years’ experience in a SOC as an L2 analyst. * Practical experience with SIEM (XSIAM, Sentinel, Splunk, QRadar preferred). * Solid hands-on experience or knowledge of SOAR exploitation (especially Cortex XSOAR). * **Knowledge of:** * Networking (TCP/IP, DNS, HTTP, firewalls) * Windows and Linux systems * Threats, TTPs (MITRE ATT&CK) * Phishing, malware, ransomware, identity attacks * Ability to conduct end-to-end incident investigations. * Experience in financial or regulated environments is desirable. **Valued Skills:** * Palo Alto Networks certifications (PCSA, PCNSA, PCNSE). * Prior experience with XDR / EDR. * Scripting knowledge (Python, PowerShell). * Experience collaborating on detection rule and playbook tuning. * Security certifications (CompTIA Security+, etc.). **What do we offer?** * Permanent contract * Remote work options and flexible working hours * 25 working days of vacation, plus December 24 and 31—which are also recognized as company-wide holidays—and additionally, you’ll have the afternoon off on your birthday! * 100% free medical and dental insurance * Career development and training plans—both technical and language-related * Access to a flexible compensation plan If this opportunity fits you, don’t hesitate to apply—we’re waiting for you! *We additionally value holding a disability certification.*


