About the job
As a Tier 1 Security Operations Center (SOC) Analyst, you will be an integral part of our front-line defense against cyber threats. Your primary responsibilities will include continuous monitoring, initial incident investigation, and swift response to security alerts and incidents. Acting as the first point of contact, you will detect suspicious activities, escalate potential threats, and ensure our digital environment remains secure.
We are looking for candidates with a solid understanding of security threats, incident detection technologies, and investigation methodologies. The ideal candidate should be adaptable, willing to work in 24/7 shifts, and eager to learn about emerging security tools and techniques.
Key Responsibilities:
- Continuously monitor SOAR, SIEM, IDS/IPS, endpoint, and network security tools for alerts and anomalies.
- Conduct triage of incoming security events to evaluate severity, scope, and potential impact.
- Investigate security alerts to distinguish between false positives and real threats.
- Document findings meticulously and escalate incidents following established SOC protocols.
- Initiate containment measures for confirmed incidents, such as isolating endpoints and disabling accounts.
- Assist in vulnerability and patch management activities by monitoring for unpatched systems.
- Stay informed about current threats and common attack techniques, including phishing, malware, and brute force attacks.
- Contribute to incident reports and conduct post-incident reviews.
- Utilize SOAR platforms to automate detection and response processes wherever possible.

