The Tier 2 SOC Analyst acts as a technical escalation point and lead responder within a Microsoft XDR–driven Security Operations Center. This role is responsible for investigating and responding to complex, high severity security incidents using Microsoft Sentinel and the Defender XDR suite, correlating signals across identity, endpoint, email, cloud, and network workloads. Tier 2 Analysts operate with minimal supervision, leverage automation and advanced hunting to reduce dwell time, and drive continuous improvement in detections, response playbooks, and SOC maturity. This role also provides mentorship to Tier 1 analysts and partners closely with engineering and cloud teams to strengthen client security posture.
1. Serve as the primary Tier 2 escalation for security incidents originating from Microsoft Sentinel and Defender XDR.
2. Perform advanced investigation and correlation of incidents across Microsoft Defender for Endpoint, Defender for Identity, Defender for Office 365, Defender for Cloud, and Entra ID.
3. Lead containment, eradication, and recovery actions, including endpoint isolation, identity controls, mailbox actions, and cloud resource remediation.
4. Conduct root cause analysis using Microsoft XDR timelines, advanced hunting queries (KQL), and incident data.
5. Own and manage high severity incidents end-to-end, ensuring accurate documentation, timely communications, and actionable post-incident reporting.
6. Develop, refine, and optimize Sentinel analytics rules, workbooks, and automation playbooks using Logic Apps and SOAR capabilities.
7. Perform proactive threat hunting using KQL and Microsoft XDR advanced hunting features to identify suspicious or emerging attacker behavior.
8. Review Tier 1 investigations for quality and accuracy, providing technical mentorship and coaching.
9. Identify recurring alert patterns, false positives, and detection gaps, recommending improvements to signal fidelity and response efficiency.
10. Support vulnerability and exposure management efforts by correlating Defender findings with active threats and business risk.
11. Assist in the development and maintenance of security policies, incident response procedures, and SOC runbooks.
12. Collaborate with engineering and cloud teams on secure configuration, remediation guidance, and architectural improvements.
13. Contribute to continuous SOC improvement initiatives focused on automation, metrics, and proactive security operations.
Required Knowledge and Skills:
Non-Technical Requirements:
Additional Consideration Given For: