Cyber Security SOC Analyst
Role details
Job location
Tech stack
Job description
In this dynamic, client-facing role, you'll monitor, investigate, and respond to security alerts using cutting-edge tools such as Microsoft Sentinel, Defender XDR, CrowdStrike Falcon, Rapid7, and Microsoft Defender for Endpoint. You'll collaborate closely with experienced analysts, benefit from mentorship, and gain valuable exposure to a wide range of cyber threats and diverse client environments., * Monitor and triage security alerts across multiple platforms and technologies (SIEM, EDR, XDR, etc.).
- Investigate potential security incidents and escalate according to established protocols.
- Collaborate with senior analysts and threat response teams to resolve incidents effectively.
- Maintain comprehensive documentation of investigations, incidents, and actions taken.
- Provide essential guidance and support to clients regarding incident handling and threat mitigation.
- Assist in the development and fine-tuning of detection rules, threat-hunting queries, and analytics.
- Stay informed about emerging threats, tactics, and technologies to continually enhance your expertise.
This role is perfect for those ready to contribute to our mission of safeguarding our clients' digital assets while developing their own skills in a fast-paced, supportive environment.
Requirements
Do you have experience in VPN?, Do you have a Bachelor's degree?, We're seeking a driven and detail-oriented Level 1 SOC Analyst to become part of our expanding Security Operations Center. This is a fantastic opportunity for individuals with foundational knowledge in cybersecurity or IT support who are eager to advance their careers in threat detection, incident response, and real-time security monitoring., SIEM & Log Analysis
- Experience with SIEM platforms, such as Microsoft Sentinel or Rapid7.
- Proficient in querying and analyzing log data; familiarity with Kusto Query Language (KQL) is a plus.
- Knowledge of alert tuning, correlation rules, and threat hunting methodologies.
Endpoint Security (EDR)
- Hands-on experience with EDR tools, such as CrowdStrike Falcon, Microsoft Defender for Endpoint, or Carbon Black.
- Ability to interpret endpoint logs and identify signs of compromise.
Malware Analysis (Basic)
- Understanding of malware behaviour, Indicators of Compromise (IoCs), and basic sandboxing or analysis techniques.
Network Security
- Knowledge of key protocols (TCP/IP, HTTP/S, DNS, SMB, RDP) and concepts such as IDS/IPS, VPNs, firewalls, and network-based threat detection.
Cloud Security
- Familiarity with security monitoring in cloud environments, especially Microsoft Azure.
- Basic understanding of cloud-native security tools and logging (e.g., Azure Security Center)., * Bachelor's degree in Cybersecurity, Information Technology, or a related field-or equivalent hands-on experience.
- Strong attention to detail and ability to follow structured processes and documentation.
- Excellent communication skills-both written and verbal-for effective client interaction and team collaboration.
- A security-focused, ethical mindset with a passion for continuous learning.
- Comfortable working in a collaborative, 24/7 shift-based SOC environment.