Job Summary:
We are seeking a proactive and detail-oriented SOC Analyst – Level 1 to join our Security Operations Center (SOC). As an L1 Analyst, you will be the first line of defense in monitoring and analyzing security alerts, identifying suspicious activities, and escalating potential threats. You will work with a team of security professionals to protect the organization’s digital assets and ensure rapid incident response.
Key Responsibilities:
• Monitor security alerts from SIEM (Security Information and Event Management) tools and other log sources (firewalls, IDS/IPS, antivirus, EDR, etc.).
• Perform initial triage and analysis of alerts to identify false positives, potential threats, and policy violations.
• Create, track, and update tickets for incidents, ensuring timely escalation to L2/L3 analysts when required.
• Document incident details thoroughly, including indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs).
• Follow Standard Operating Procedures (SOPs) for incident response and event handling.
• Assist in threat intelligence gathering by identifying recurring threats or suspicious patterns.
• Support compliance and audit requirements by ensuring logs and actions are properly documented.
• Work in 24/7 shift rotation, including nights, weekends, and holidays (as applicable). Required Skills & Qualifications:
• Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent work experience).
• Basic understanding of:
Networking concepts (TCP/IP, DNS, HTTP, etc.)
Security concepts (malware, phishing, ransomware, etc.)
Common attack vectors and MITRE ATT&CK framework.
• Familiarity with at least one SIEM platform (e.g., Splunk, IBM QRadar, ArcSight, etc.).
• Strong analytical and problem-solving skills.
• Excellent communication and documentation abilities.
• Ability to work under pressure in a fast-paced environment.
Nice-to-Have Skills:
• Industry certifications (any of the following):
CompTIA Security+
EC-Council Certified SOC Analyst (CSA)
Splunk Core Certified User / Analyst
Microsoft SC-200: Security Operations Analyst
Certified Ethical Hacker (CEH) – Entry-Level Use
• Exposure to:
Endpoint Detection and Response (EDR) tools.
Cloud security tools (e.g., Microsoft Defender for Cloud, AWS Security Hub).
Ticketing systems like ServiceNow or Jira.
• Knowledge of scripting (Python, PowerShell) is a plus.
Soft Skills:
• Eagerness to learn and grow in cybersecurity.
• Attention to detail and a security-first mindset.
• Team-oriented with a collaborative attitude.
• High level of integrity and professionalism.