SG

Analyst (Tier 2) - Cybersecurity Operations

Sysco GB
Posted onFeb 13, 2026
LocationKraków, Lesser Poland Voivodeship, Poland (Hybrid)
Employment typeFull-time

JOB DESCRIPTION

Job Title: Analyst (Tier 2) - Cybersecurity Operations

Work Mode & Environment

  • Location: Kraków, Poland
  • Shift work : 4x10 per week Sunday - Wednesday or Wednesday - Saturday
  • Working Hours: 9.00 am to 7.00 pm Local time
  • Hybrid work: 2 days in office and 2 days remote 
  • Job Type: Full time

Responsibilities and Duties

  • Cybersecurity SOC Tier 2 analyst must be able to do the following:
    • Correlate threat data from various sources to establish the threat/impact against the network.
    • After assessment of the data, recommend appropriate countermeasures, facilitating tracking, preliminary handling of investigations, and reporting of all security events and computer incidents.
    • Remediation actions and apply lessons learned to security incident investigation and resolution
    • Perform monitoring, identification and resolution of security events to detect threats through analysis, investigations and prioritization of events based on risk/exposure
    • Develop processes which analyzes data, producing accurate, meaningful, easily interpreted results based on user requirements and use cases
    • Develop processes which align with enterprise incident response activities and coordinate closely with other teams within the Security Operations Center
    • Create custom tool content to enhance capabilities of security operations teams
    • Manage the collection, documentation and research of security events generated by the SOC monitoring platform and infrastructure
    • Provide support to Security Incident Management aligned with NIST standards

Technical writing experience

  • Standard Operating Procedures
  • Runbooks/Playbooks
  • Incident Response Plans
  • Support training develop with both analysts and tabletop exercises
  • Assist or lead the effort in Tool configuration and content creation

Qualifications:

  • 2-4 years of experience on one of the following team(s): Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC)
  • Degree in Computer Science, Information Technology, or equivalent work experience
  • Experience supporting Cyber Security Operations in a large enterprise environment
  • Experience with Incident Response, analysis of network traffic, log analysis, ability to prioritize and differentiate between potential intrusion attempts and false alarms, managing and tracking investigations to resolution
  • Experience with SIEM & Log Management solution
  • Familiarity with one of the following; NIST Incident Response Lifecycle, Cyber Kill Chain, Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) Metrics
  • CCNA Security, GCIA, GCIH, CYSA+, Security+ or other related security certifications
  • At minimum there must be one active security certification

Experience with one or more of the following tools:

  • Qradar SIEM/Cortex XSOAR
  • SentinelOne
  • Proofpoint Email
  • Azure Suite
  • Zscaler

Why Join Us

  • Be part of a global cybersecurity team protecting a dynamic enterprise environment.
  • Opportunity to work with modern security technologies and drive tool innovation.
  • Collaborative culture with professional development opportunities.
  • Hybrid work model with our Kraków office as the primary location.

The hiring team hasn’t shared details about the company yet.

Similar jobs

You might also be interested in...

IN3d

L1 SOC Analyst - Sofia

Integrity360

София, Sofia Capital, Bulgaria (On-site)

FI1d

SOC Analyst

Fortinet, Inc.

Praha, Prague, Czech Republic (On-site)

IN3d

L2 SOC Analyst

Integrity360

Dublin, County Dublin, Ireland (On-site)

BL1d

Security Operations (SecOps) Analyst

Blackfluo.ai

Île de Ré, Charente-Maritime, France (On-site)

HA1d

Cybersecurity Defense Analyst

Help AG

Riyadh, Riyadh Province, Saudi Arabia (On-site)