About the job
Join Protera Technologies as an L2 SOC Analyst
Welcome to Protera Technologies, where we are revolutionizing the operational landscape for SAP-centric organizations in the cloud. Since 1998, we have led the way in transitioning SAP and related applications to the cloud, utilizing platforms like Microsoft Azure and AWS. Our diverse team, with a presence in the US, Greece, and India, is dedicated to simplifying IT processes for our clients, making them more efficient and enjoyable.
At Protera, we pride ourselves on our vibrant and approachable culture. While we are committed to delivering exceptional IT solutions, we also value a workplace that is engaging and fun. We put in the hard work, but we also ensure there's time for team bonding and celebrations, whether that's through collaborative projects or social events.
We are passionate about equipping SAP-focused organizations with cutting-edge tools that foster growth. Our core values are straightforward: embrace curiosity, remain authentic, and cultivate meaningful connections. We celebrate every milestone, whether it’s a significant project accomplishment or a memorable team gathering.
If you're searching for an environment where innovation meets enjoyment, we invite you to discover why Protera is an outstanding place to build your career.
Responsibilities
The L2 SOC Analyst plays a critical role in safeguarding our organization’s cybersecurity framework through vigilant monitoring, threat detection, and incident management. Leveraging advanced technologies such as Endpoint Detection and Response (EDR), Security Information and Event Management (SIEM), Network Detection and Response (NDR), File Integrity Monitoring (FIM), and Next-Gen Antivirus (NGAV), the analyst will identify and address security threats in real-time. The role also involves contributing to the design and implementation of automated playbooks via Security Orchestration, Automation, and Response (SOAR) platforms, enhancing response workflows and overall SOC effectiveness. Collaboration across teams is essential to strengthen detection strategies, refine processes, and ensure proactive measures against evolving cybersecurity threats.
Key Responsibilities
Threat Monitoring & Detection
- Monitor and assess security alerts from SIEM, EDR, NDR, FIM, and Antivirus platforms for potential threats.
- Conduct correlation and pattern analysis across various data sources to identify irregularities and advanced attack behaviors.
- Continuously refine and optimize detection rules to minimize false positives and enhance accuracy.
Incident Response & Management
- Implement incident response lifecycle activities including triage, containment, eradication, and recovery in alignment with NIST standards.
