Level 2 Monitoring Engineer
About the role
The position of L2 Monitoring Engineer in a Security Operations Center (SOC) involves advanced supervision and management of security events. This position requires knowledge of monitoring tools, incident analysis, and rapid response to threats to ensure the integrity of the organization's systems. The engineer must collaborate with the security team to identify patterns, resolve vulnerabilities, and improve overall protection. The ability to handle situations under pressure and clear communication are essential for this critical role in defending the IT infrastructure.
Your Main Challenges
- Perform advanced and in-depth analysis of security incidents.
- Investigate and manage complex incidents, including threat identification and mitigation.
- Develop and update incident response procedures.
- Coordinate with other IT and security teams to resolve incidents.
- Conduct vulnerability assessments and penetration testing.
- Train Level 1 analysts.
- Participate in the continuous improvement of security policies and procedures.
- Collaboration and relevant training within Delta Academy to ensure alignment with the security policies implemented in Delta Protect's ISMS. And to ensure their correct execution.
What you need to be successful
- In-depth knowledge of networks, operating systems, and applications.
- Experience with forensic analysis and incident response tools.
- Scripting and automation skills (PowerShell, Python).
- Advanced knowledge of network protocols (TCP/IP, UDP, HTTP/HTTPS, DNS, DHCP, FTP).
- Experience with traffic monitoring and analysis tools (Wireshark, tcpdump, NetFlow).
- Advanced knowledge of network topologies, VLANs, VPNs, firewalls, switches, and routers.
- Proficiency in SIEM tools, creation of advanced rules, and alert analysis.
- Advanced management of EDR or EPP solutions (SentinelOne+).
- Ability to lead investigations of complex incidents.
- Skills in threat hunting techniques.
- Knowledge of web vulnerabilities (OWASP Top 10) and scanning tools (OWASP ZAP, Burp Suite).
- Scripting skills to automate security tasks.
- Advanced knowledge of security standards and best practices.
- Knowledge of phishing techniques.
- Knowledge of virtualization platforms and cloud services.
- Ability to manage multiple incidents and priorities simultaneously.
Required/Desirable Certifications
Required (at least 1)
- Certified Ethical Hacker (CEH)
- Certified Incident Handler (GCIH)
- Certified Incident Handler (ECIH)
- Certified Network Defender (CND)
- Or similar...
Recommended
- Certified Information Security Manager (CISM)
- CompTIA CySA+ (Cybersecurity Analyst)
- Or similar...
Extra Insights
- Mastery of the field of cybersecurity
- Critical Thinking
- Self-Goal Oriented and Proactivity
- Out-of-the-box thinking: creativity in problem solving.
- Excellent communication and documentation skills.
- Analytical mindset and ability to think critically.
- Commitment to continuous improvement and updating of knowledge



















