Skip to content
MVPeople Group Logo
MVPeopleGroup
SOC & Blue Team

Security Analyst (Tier-2) – SOC

AmsterdamConsultancyHybridMediorbankwezen

About the assignment

You join the Security Operations Center of a leading organisation in the financial sector. You investigate alerts, analyse threats, and respond to security incidents that matter. Your work directly protects critical systems and customer data.

You operate at Tier-2 level: you handle complex incident investigations, escalate threats appropriately, and contribute to SOC process improvements. You ask critical questions and deliver high-quality analysis.

Your responsibilities

  • Investigate security alerts and determine severity using MITRE ATT&CK and NIST frameworks
  • Analyse malware, network traffic, and endpoint logs to identify root causes
  • Escalate incidents to Tier-3/incident response when required
  • Document findings clearly and maintain comprehensive incident records
  • Identify patterns across incidents and recommend preventive controls
  • Participate in threat intelligence briefings and SOC process refinement
  • Assist in tuning detection rules to reduce false positives
  • Collaborate with blue team and infrastructure teams during incident response

Tech Stack & Tools

Platforms & Tooling

SplunkMicrosoft SentinelCrowdStrike FalconCortex XDR

Frameworks & Standards

MITRE ATT&CKNIST Incident ResponseOWASP Top 10

Cloud & Infrastructure

Microsoft AzureAWS (Security Hub, GuardDuty)

Methodologies

Incident investigationThreat analysisLog analysisRoot cause analysis

Certifications (preferred)

CompTIA CySA+GCIA (GIAC Certified Intrusion Analyst)GCIH (GIAC Certified Incident Handler)

Must-haves

  • 3+ years in SOC operations or security monitoring
  • Hands-on experience with SIEM platforms (Splunk, Sentinel, or equivalent)
  • Strong understanding of incident investigation workflows
  • Ability to read and interpret logs, network traffic, and endpoint data
  • Excellent documentation and communication skills

Nice-to-haves

  • Experience with endpoint detection platforms (CrowdStrike, Cortex XDR)
  • Knowledge of MITRE ATT&CK framework and threat intelligence
  • Relevant security certification (CySA+, GCIH, GCIA)
  • Exposure to threat hunting or proactive detection work

What we offer

  • Work on real security incidents in a financial services environment
  • Access to premium security tools and continuous threat intelligence
  • Structured learning pathway from Tier-2 towards senior analyst or specialisation roles
  • Collaborative SOC team with clear escalation and mentoring
  • Personal guidance from a dedicated MVPeople consultant who knows your niche

The process

1

Introduction

Phone call with your MVPeople consultant (within 24 hours)

2

Match & Brief

We discuss the assignment in detail and prepare you

3

Client meeting

Introduction to the client

4

Start

Contracting and onboarding

Details

Type

Consultancy

Location

Amsterdam

Work model

Hybrid

Level

Medior

Industry

bankwezen

Posted

5 March 2026


Contact

Apply nowMore information
Apply now