The SOC Analyst is responsible for monitoring, analyzing, and responding to security threats and incidents to ensure the protection of the organizations IT and Security infrastructure. This role serves as the first line of defense against cyber threats.
Key Responsibilities:
Monitor security alerts and logs using our Platform, SIEM, EDR, OSINT and other security tools to identify potential threats or unusual activities.
Triage and investigate alerts, determining their relevance and urgency, and escalate incidents as needed.
Respond to security incidents by investigating, containing, and mitigating threats.
Analyze and interpret security data to identify vulnerabilities and anticipate emerging threats.
Review and analyze logs from various sources (network, endpoint, application) to detect anomalies and breaches.
Operate and manage security tools and technologies, such as firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint detection and response (EDR), and vulnerability scanners.
Document incidents, actions taken, and resolutions; prepare detailed reports for management and compliance purposes.
Participate in Security meetings and working groups to improve processes and share knowledge.
Assist with the development and implementation of basic SSDLC processes
Stay current with the latest security threats, vulnerabilities, and industry best practices.
Requirements: Required Skills & Qualifications:
2-3 years in a cybersecurity role, preferably in a SOC environment.
Experience with AWS, Azure, or GCP Required.
CompTIA Security+, CEH, , or similar certifications are preferred.
Proficiency with SIEM tools, security monitoring, network/system administration, basic scripting.
Strong analytical and problem-solving abilities to analyze and address complex security issues.
Good English.
This position is open to all candidates.