Epicareer Might not Working Properly
Learn More
E

SOC Analyst L1

Salary undisclosed

Checking job availability...

Original
Simplified

KEY RESPONSIBILITIES:

-Monitor Security Events: Actively monitor and analyze logs from various sources (firewalls, IDS/IPS, servers, applications) for potential security incidents using SIEM tools like Splunk, Microsoft Sentinel, etc.

-Triage and Investigate Alerts: Review and analyze alerts escalated from Level 1 analysts, identifying true positive and false positive events, and escalating genuine threats to senior analysts.

-Incident Response: Assist in responding to detected security events, providing detailed analysis, containment recommendations, and initial remediation actions.

-Threat Intelligence: Research and apply threat intelligence to security monitoring tools, helping identify emerging threats and reducing false positives.

-Security Assessments: Contribute to periodic vulnerability assessments, ensuring that monitoring tools and configurations are aligned with organizational security requirements.

-Documentation: Maintain and update security incident reports, dashboards, and playbooks. Document incident findings and lessons learned to improve future incident response strategies.

-Collaboration: Work closely with SOC team members and IT departments to ensure timely resolution of security issues and implementation of security best practices.

-Tool Optimization: Provide feedback on security tools and recommend configuration improvements to enhance threat detection and response capabilities.

-Training & Mentorship: Assist in mentoring Level 1 analysts by providing guidance on triaging alerts and investigating incidents.

REQUIRED SKILLS, EXPERIENCES AND QUALIFICATIONS:

-Bachelor’s degree in Information Security, Computer Science, or a related field preferred, or equivalent experience.

-1-2 years of experience in a SOC or IT security role, with exposure to security monitoring, analysis, and incident response.

-Familiarity with security tools such as SIEM (e.g., Splunk, Microsoft Sentinel), IDS/IPS, firewalls, and endpoint detection tools (e.g., Carbon Black, CrowdStrike).

-Understanding of network protocols, operating systems (Windows, Linux), and general IT infrastructure.

-Basic knowledge of common security frameworks (e.g., NIST, ISO 27001).

-Relevant certifications preferred (e.g., CompTIA Security+, CEH, CySA+).

Job Types: Full-time, Permanent

Benefits:

  • Additional leave
  • Health insurance
  • Maternity leave
  • Professional development

Schedule:

  • Afternoon shift
  • Day shift
  • Evening shift
  • Night shift

Supplemental Pay:

  • Overtime pay

Application Question(s):

  • How long is your notice period?
  • What is your expected salary?

Experience:

  • SOC or IT security role: 1 year (Required)