L2 Incident Response Analyst at Axiata Digital Labs
Colombo, Western Province, Sri Lanka -
Full Time


Start Date

Immediate

Expiry Date

13 Apr, 26

Salary

0.0

Posted On

13 Jan, 26

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Incident Response, SIEM, EDR, Threat Intelligence, Log Analysis, Forensics, Red Team, MITRE ATT&CK, Communication Skills, Cybersecurity, Packet Analysis, NIST, ISO 27035, Scripting, Automation, Cloud Security

Industry

IT Services and IT Consulting

Description
Key Responsibilities Perform deep-dive analysis on escalated alerts: correlate logs (SIEM), network traffic, endpoint (EDR), and threat intelligence Confirm scope, severity, and root cause; classify based on NIST/ISO 27035 guidelines Lead containment, eradication, and recovery steps (e.g., isolate endpoints, revoke credentials) Coordinate incident response war rooms and liaise with L1, L3, and business stakeholders Conduct post-incident reviews; document timelines, evidence, and lessons learned Recommend preventive controls and SOC improvements (playbook updates, SIEM rule tuning) Analyze Red Team findings, incorporate into IR playbooks, escalations, and detection logic Support tuning of SIEM (Sentinel preferred), EDR, and alerting thresholds Participate in cyber drills, tabletop exercises, and metrics review to enhance SOC maturity Maintain incident tickets and generate comprehensive incident reports including timeline, impact, root cause, and recommended mitigation Person Specifications 3–5 years in security operations, incident response, or SOC Analyst roles Bachelors degree in Cybersecurity, Computer Science, or related field Certifications: GCIH, GCFA, GREM, CEH preferred Hands-on experience with SIEM tools (Microsoft Sentinel strongly preferred; Splunk, QRadar) Practical knowledge of EDR technologies, threat intelligence platforms, packet analysis, and forensic tools Experience working with Red Team or penetration test findings in strengthening SOC defenses Solid understanding of incident response lifecycle, threat actor tactics, and detection frameworks like MITRE ATT&CK Proficiency in log analysis, endpoint forensics, packet analysis (e.g., Wireshark), and IOC extraction Familiarity with IR frameworks and compliance standards (NIST, ISO 27035, GDPR/PDPA) Strong communication skills; capable of leading incident discussions and coordinating with diverse teams Nice to have Scripting skills (Python, PowerShell) for automation and data analysis Threat hunting experience, analyzing Red Team reports for SOC enhancements Exposure to SOAR tools, vulnerability management, and cloud-native IR in Azure/AWS environments ITIL, ITSM, or incident management experience
Responsibilities
The L2 Incident Response Analyst will perform deep-dive analysis on escalated alerts and lead containment, eradication, and recovery steps. They will also coordinate incident response efforts and conduct post-incident reviews.
Loading...