Skip to content
MVPeople Group Logo
MVPeopleGroup
SOC & Blue Team

Security Analyst (Tier-2) – SOC

AmsterdamConsultancyHybrideMediorbankwezen

Over de opdracht

You join the Security Operations Center of a leading organisation in the financial sector. You investigate alerts, analyse threats, and respond to security incidents that matter. Your work directly protects critical systems and customer data.

You operate at Tier-2 level: you handle complex incident investigations, escalate threats appropriately, and contribute to SOC process improvements. You ask critical questions and deliver high-quality analysis.

Jouw werkzaamheden

  • Investigate security alerts and determine severity using MITRE ATT&CK and NIST frameworks
  • Analyse malware, network traffic, and endpoint logs to identify root causes
  • Escalate incidents to Tier-3/incident response when required
  • Document findings clearly and maintain comprehensive incident records
  • Identify patterns across incidents and recommend preventive controls
  • Participate in threat intelligence briefings and SOC process refinement
  • Assist in tuning detection rules to reduce false positives
  • Collaborate with blue team and infrastructure teams during incident response

Tech Stack & Tools

Platforms & Tooling

SplunkMicrosoft SentinelCrowdStrike FalconCortex XDR

Frameworks & Standaarden

MITRE ATT&CKNIST Incident ResponseOWASP Top 10

Cloud & Infrastructure

Microsoft AzureAWS (Security Hub, GuardDuty)

Methodieken

Incident investigationThreat analysisLog analysisRoot cause analysis

Certificeringen (pré)

CompTIA CySA+GCIA (GIAC Certified Intrusion Analyst)GCIH (GIAC Certified Incident Handler)

Must-haves

  • 3+ years in SOC operations or security monitoring
  • Hands-on experience with SIEM platforms (Splunk, Sentinel, or equivalent)
  • Strong understanding of incident investigation workflows
  • Ability to read and interpret logs, network traffic, and endpoint data
  • Excellent documentation and communication skills

Nice-to-haves

  • Experience with endpoint detection platforms (CrowdStrike, Cortex XDR)
  • Knowledge of MITRE ATT&CK framework and threat intelligence
  • Relevant security certification (CySA+, GCIH, GCIA)
  • Exposure to threat hunting or proactive detection work

Wat wij bieden

  • Work on real security incidents in a financial services environment
  • Access to premium security tools and continuous threat intelligence
  • Structured learning pathway from Tier-2 towards senior analyst or specialisation roles
  • Collaborative SOC team with clear escalation and mentoring
  • Personal guidance from a dedicated MVPeople consultant who knows your niche

Het proces

1

Kennismaking

Telefonisch gesprek met je MVPeople consultant (binnen 24 uur)

2

Match & Brief

We bespreken de opdracht in detail en bereiden je voor

3

Klantgesprek

Introductie bij de opdrachtgever

4

Start

Contractering en onboarding

Details

Type

Consultancy

Locatie

Amsterdam

Werkmodel

Hybride

Niveau

Medior

Sector

bankwezen

Geplaatst

5 maart 2026


Contact

Reageer directMeer informatie
Reageer direct