Job Description
THE WORK: We are looking for a motivated individual to join our Security team and support a key managed services engagement. As a SOC Analyst, you will play a critical role in monitoring, investigating, and triaging security alerts. You will work with established playbooks and processes to ensure timely and accurate threat response. Key responsibilities include:
Monitor security alerts from various systems like SIEMs and EDRs.
Perform initial investigation and analysis of security alerts to identify true threats versus false positives.
Follow established playbooks and runbooks for incident handling.
Escalate confirmed incidents to Level 2 analysts according to established service-level agreements (SLAs).
Correlate logs from multiple sources to verify incidents.
Document all actions taken during an investigation.
Communicate with stakeholders about security events.
HERE'S WHAT YOU WILL NEED:
0-2 years of experience in relevant related skills.
Bachelor's Degree in relevant field of studies.
Relevant certifications like CompTIA Security+, Certified SOC Analyst, or similar.
Familiarity with Security Information and Event Management (SIEM) platforms like Splunk, Sentinel, Google SecOps, etc
Basic understanding of network security concepts and technologies (e.g., firewalls, IDS/IPS).
Knowledge of security tools like Endpoint Detection and Response (EDR) and SOAR platforms is beneficial
Familiarity with operating systems, including log analysis on Windows and Linux.
Good communication skills, both written and verbal, for documentation and reporting.
Strong analytical and problem-solving skills.
BONUS POINTS IF YOU HAVE:
Advanced proficiency in Splunk Enterprise Security.
Advanced proficiency in Microsoft Azure Sentinel.