SOC Analyst (Level 2)

Posted 8 Days Ago
16 Locations
In-Office or Remote
Mid level
Fintech • Software • Financial Services • Cryptocurrency
The Role
As a SOC Analyst (Level 2), you'll manage high-severity alerts, lead investigations, coordinate with teams, and mentor Level 1 analysts while enhancing SOC operations.
Summary Generated by Built In
About Keyrock

Since our beginnings in 2017, we've grown to be a leading change-maker in the digital asset space, renowned for our partnerships and innovation.

Today, we rock with over 200 team members around the world. Our diverse team hails from 42 nationalities, with backgrounds ranging from DeFi natives to PhDs. Predominantly remote, we have hubs in London, Brussels, Singapore and Paris, and host regular online and offline hangouts to keep the crew tight.

We are trading on more than 80 exchanges, and working with a wide array of asset issuers. As a well-established market maker, our distinctive expertise led us to expand rapidly. Today, our services span market making, options trading, high-frequency trading, OTC, and DeFi trading desks as well as digital asset management. Keyrock is looking to expand and establish itself as a full-service financial institution through both organic innovation and inorganic growth.

But we’re more than a service provider. We’re an initiator. We're pioneers in adopting the Rust Development language for our algorithmic trading systems, and champions of its use in the industry. We support the growth of Web3 startups through our Accelerator Program. We upgrade ecosystems by injecting liquidity into promising DeFi, RWA, and NFT protocols. And we push the industry's progress with our research and governance initiatives.

At Keyrock, we're not just envisioning the future of digital assets. We're actively building it.

Role Summary

As a SOC Analyst (Level 2), you are the escalation point for complex investigations and active incidents. You’ll take ownership of high-severity alerts, lead technical triage through containment, and coordinate with Incident Response, Cloud/Platform, Identity, and Engineering teams. You’ll also improve SOC quality by tuning detections, refining playbooks, mentoring Level 1 analysts, and driving post-incident learnings into better controls.

What You’ll Do (Core Responsibilities)

Advanced detection and investigation

  • Take escalations from L1 and independently investigate complex, multi-signal alerts (identity compromise, cloud control-plane abuse, endpoint persistence, lateral movement, suspicious automation, data exfiltration).

  • Perform deep log/telemetry analysis across SIEM, EDR, cloud logs, IAM signals, network telemetry, email security, and SaaS audit trails.

  • Build and validate hypotheses, pivot across data sources, and produce clear incident timelines and scope assessments.

Incident response and containment

  • Serve as technical incident lead for defined incident types/severities (or co-lead with IR), driving containment and eradication steps within authorized bounds.

  • Execute and improve response playbooks for key scenarios (phishing/BEC, credential theft, token/key compromise, suspicious API activity, ransomware indicators, insider risk signals).

  • Coordinate evidence collection and preservation to support legal/compliance needs and potential third-party investigations.

Threat intelligence and adversary tradecraft

  • Enrich investigations with threat intel (IOCs, TTPs) and map observed behavior to frameworks (e.g., ATT&CK) to improve detection fidelity.

  • Maintain watchlists and detection logic for priority threats relevant to cloud-first financial and digital-asset operations.

Detection engineering and SOC improvement

  • Tune SIEM correlation rules, EDR policies, and alert thresholds to reduce false positives and increase signal quality.

  • Propose and implement new detections for emerging techniques (identity + cloud abuse, OAuth/app consent attacks, API key leakage, CI/CD pipeline tampering).

  • Improve runbooks and automate repetitive enrichment steps (SOAR workflows, scripts, queries).

Operational leadership

  • Provide mentorship and real-time guidance to L1 analysts; improve escalation quality through coaching and feedback.

  • Manage shift handovers for active investigations and ensure high-quality case documentation.

  • Contribute to SOC metrics (MTTD, MTTR, false-positive rate, escalation accuracy) and continuous improvement efforts.

What We’re Looking For (Minimum Qualifications)
  • 2–5+ years of SOC / incident response / security operations experience (or equivalent hands-on experience in a fast-paced production environment).

  • Strong ability to investigate across cloud security operations, endpoint security, identity, and core network fundamentals.

  • Proficiency with at least one SIEM and common SOC tooling (e.g., Splunk/Elastic/Sentinel; CrowdStrike/Defender; Jira/ServiceNow).

  • Ability to write clear incident documentation: timelines, scope, impact, containment actions, and recommended remediations.

  • Comfort operating in an on-call or shift environment (depending on coverage model).

Nice to Have (Preferred)
  • Detection engineering experience: correlation rules, Sigma/KQL/SPL, alert pipelines, SOAR automation.

  • DFIR fundamentals: triage acquisition, volatile vs. non-volatile evidence, endpoint artifact analysis.

  • Container/Kubernetes logging and runtime security exposure.

  • Practical scripting (Python/Bash) for analysis and automation.

  • Digital-asset ecosystem exposure and 24/7 trading operations familiarity.

  • Certifications (optional): GCIH, GCIA, GCED, SC-200, AWS Security Specialty, or equivalent.

What Success Looks Like (First 90 Days)
  • Independently lead investigations for high-severity alerts with strong scoping, decisive containment, and clean cross-team coordination.

  • Reduce recurrence of common incidents by driving tangible improvements (detections, playbooks, IAM hardening recommendations).

  • Improve L1 escalation quality through coaching and better runbooks.

  • Deliver measurable SOC enhancements (e.g., tuned rules reducing false positives, new detection coverage, automation that reduces triage time).

Working Style We Value
  • Calm, structured response under pressure.

  • High ownership and strong communication across technical and non-technical stakeholders.

  • A continuous-improvement mindset: every incident becomes better detections, better controls, and better resilience.

Top Skills

Bash
Crowdstrike
Defender
Elastic
JIRA
Python
Sentinel
Servicenow
SIEM
Splunk
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Brussels
163 Employees
Year Founded: 2017

What We Do

Scaling liquidity and pricing assets since 2017. We enhance digital markets. Backed by time-tested algorithms and ironclad tech.

Market making - OTC - Options

Through a combination of in-house algorithmic trading tools, high-frequency trading infrastructure and industry expertise, Keyrock provides unparalleled liquidity services to tokens, exchanges and brokerages within the cryptocurrency ecosystem.

Keyrock operates with the vision of democratizing cryptocurrency liquidity through a strict dedication to transparency, operational integrity and regulatory compliance.

Similar Jobs

Datadog Logo Datadog

Senior Partner Manager - Channels (South EMEA)

Artificial Intelligence • Cloud • Security • Software • Cybersecurity
Easy Apply
Remote or Hybrid
Italy
6500 Employees

GitLab Logo GitLab

Engineering Manager

Cloud • Security • Software • Cybersecurity • Automation
Easy Apply
Remote
30 Locations
2500 Employees
132K-282K Annually

GitLab Logo GitLab

Full-stack Engineer

Cloud • Security • Software • Cybersecurity • Automation
Easy Apply
Remote
31 Locations
2500 Employees

Tufin Logo Tufin

Account Manager

Security • Cybersecurity
Remote or Hybrid
Italy
500 Employees

Similar Companies Hiring

Scotch Thumbnail
Software • Retail • Payments • Fintech • eCommerce • Artificial Intelligence • Analytics
US
25 Employees
Milestone Systems Thumbnail
Software • Security • Other • Big Data Analytics • Artificial Intelligence • Analytics
Lake Oswego, OR
1500 Employees
Fairly Even Thumbnail
Software • Sales • Robotics • Other • Hospitality • Hardware
New York, NY

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account