Intermediate SOC Analyst (L2)

3M CompaniesAustin, TX
29dOnsite

About The Position

Intermediate SOC Analyst (L2) Collaborate with Innovative 3Mers Around the World Choosing where to start and grow your career has a major impact on your professional and personal life, so it's equally important you know that the company that you choose to work at, and its leaders, will support and guide you. With a wide variety of people, global locations, technologies and products, 3M is a place where you can collaborate with other curious, creative 3Mers. This position provides an opportunity to transition from other private, public, government or military experience to a 3M career. The Impact You Will Make in this Role The L2 Security Operations Center Analyst plays a critical role in the Cyber Defense Organization's cybersecurity operations by conducting in-depth analysis of security events, escalating confirmed incidents, and supporting incident response efforts. Operating as a mid-tier, this role bridges the gap between initial triage and advanced investigation. The ideal candidate will have a strong technical foundation, analytical mindset, and a proactive approach to identifying and mitigating threats across enterprise and industrial environments.

Requirements

  • Bachelor's degree in Cybersecurity, Information Technology, or Computer Science (completed and verified prior to start)
  • Two (2) years of experience in a SOC or cybersecurity operations role in a private, public, government or military environment

Nice To Haves

  • Effective communicator with the ability to document investigations and collaborate with cross-functional teams
  • Certifications such as CompTIA Security+, CySA+, or GCIH
  • Proficiency in analyzing alerts from SIEM, EDR, and network monitoring tools
  • Familiarity with threat intelligence, basic malware analysis, and log correlation techniques
  • Understanding of common attack vectors, threat actor behaviors, and frameworks like MITRE ATT&CK
  • Strong analytical and problem-solving skills with attention to detail
  • Experienced in triaging and investigating security alerts across SIEM, EDR, and network platforms
  • Skilled in correlating data from multiple sources to identify and escalate confirmed threats
  • Proficient in supporting incident response efforts and conducting initial root cause analysis
  • Strong understanding of threat intelligence and its application in operational workflows
  • Effective communicator with the ability to document investigations clearly and collaborate across teams
  • Committed to continuous learning and development in threat detection and response
  • Analytical thinker with a proactive approach to identifying and mitigating risks
  • Reliable team player in a 24/7 SOC environment, contributing to operational excellence

Responsibilities

  • Monitor and analyze security alerts from SIEM, EDR, and other security platforms to identify potential threats.
  • Perform in-depth investigation of suspicious activity, correlating data across multiple sources to determine scope and impact.
  • Lead the resolution of low to moderately complex security incidents, including containment, eradication, and recovery actions.
  • Escalate confirmed incidents to L3 analysts or incident response teams with detailed documentation and recommendations.
  • Support containment and remediation efforts during active incidents.
  • Conduct initial root cause analysis and contribute to post-incident reviews to identify gaps and improve future response efforts.
  • Leverage threat intelligence, behavioral analytics, and contextual data to enhance detection, investigation, and resolution capabilities.
  • Collaborate with detection engineering teams to develop, test, and tune detection rules and use cases.
  • Perform basic malware analysis, log correlation, and network traffic inspection to support incident resolution.
  • Maintain up-to-date knowledge of the threat landscape, including attacker tactics, techniques, and procedures (TTPs), and apply this knowledge to improve incident handling.
  • Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate incident resolution efforts.
  • Document investigation steps, findings, and resolution actions in a clear, structured, and timely manner.
  • Participate in SOC shift rotations to ensure 24/7 monitoring and rapid response to security events.
  • Contribute to the continuous improvement of SOC processes, playbooks, and knowledge base, with a focus on enhancing incident resolution workflows

Benefits

  • 3M offers many programs to help you live your best life - both physically and financially.
  • To ensure competitive pay and benefits, 3M regularly benchmarks with other companies that are comparable in size and scope.
  • Medical, Dental & Vision, Health Savings Accounts, Health Care & Dependent Care Flexible Spending Accounts, Disability Benefits, Life Insurance, Voluntary Benefits, Paid Absences and Retirement Benefits

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Industry

Miscellaneous Manufacturing

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service