The Role
The Security Analyst - SOC Operations (Level 2) is responsible for advanced monitoring, investigation, and response to cybersecurity incidents within a Private 5G Security Operations Center. This role performs in-depth analysis of incidents escalated from Level 1, leads root cause investigations, and supports the continuous security and resilience of 4G/5G RAN and Core networks. The position plays a critical role in strengthening detection capabilities, improving response processes, and ensuring uninterrupted and secure network operations.
Duties and Responsibilities
Conduct detailed analysis of security incidents escalated by L1 SOC analysts.
Perform root cause analysis and advanced investigations to determine scope, impact, and threat vectors.
Respond to, contain, and remediate security incidents while minimizing operational and service impact.
Utilize advanced security tools and techniques to analyze, investigate, and mitigate threats.
Collaborate with internal and external teams to implement corrective and preventive security controls.
Document incident findings, actions taken, and lessons learned in accordance with SOC procedures.
Provide recommendations for improving incident response playbooks and 5G-specific security procedures.
Maintain strong working knowledge of 4G/5G protocols, signaling flows, and architectures for RAN and Core.
Provide technical guidance, mentoring, and on-the-job training to L1 SOC analysts.
Monitor evolving threat landscapes, vulnerabilities, and technologies impacting 5G environments.
Support and maintain the 5G SOC operations lab.
Ensure the ongoing integrity, availability, and security of 5G RAN and Core network environments.
Requirements
Bachelors degree in Computer Science, Information Security, or a related discipline.
Strong understanding of TCP/IP, OSI Seven Layer Model, and diverse network architectures.
Strong knowledge of cybersecurity principles and 4G/5G technologies.
Hands-on experience with security tools including SIEM, SOAR, IDS/IPS, and forensic analysis tools.
Proven ability to conduct advanced investigations, including malware analysis and threat containment.
Experience working in 4G/5G Security Operations environments.
Experience in ISP or telecom environments is a strong advantage.
Hands-on experience with Splunk and Microsoft Sentinel.
Experience across IT and OT environments.
Strong analytical, problem-solving, documentation, and communication skills.
Ability to work under pressure and respond effectively to security incidents.
Industry certifications are preferred, including CompTIA Security+, CSA, CCNA CyberOps, CySA+, GCIH, BTL1, MITRE ATT&CK Defender (MAD), and Splunk / Microsoft Sentinel certifications.
MNCJobsGulf.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.