KEY RESPONSIBILITIES:
-Monitor Security Events: Actively monitor and analyze logs from various sources (firewalls, IDS/IPS, servers, applications) for potential security incidents using SIEM tools like Splunk, Microsoft Sentinel, etc.
-Triage and Investigate Alerts: Review and analyze alerts escalated from Level 1 analysts, identifying true positive and false positive events, and escalating genuine threats to senior analysts.
-Incident Response: Assist in responding to detected security events, providing detailed analysis, containment recommendations, and initial remediation actions.
-Threat Intelligence: Research and apply threat intelligence to security monitoring tools, helping identify emerging threats and reducing false positives.
-Security Assessments: Contribute to periodic vulnerability assessments, ensuring that monitoring tools and configurations are aligned with organizational security requirements.
-Documentation: Maintain and update security incident reports, dashboards, and playbooks. Document incident findings and lessons learned to improve future incident response strategies.
-Collaboration: Work closely with SOC team members and IT departments to ensure timely resolution of security issues and implementation of security best practices.
-Tool Optimization: Provide feedback on security tools and recommend configuration improvements to enhance threat detection and response capabilities.
-Training & Mentorship: Assist in mentoring Level 1 analysts by providing guidance on triaging alerts and investigating incidents.
REQUIRED SKILLS, EXPERIENCES AND QUALIFICATIONS:
-Bachelor’s degree in Information Security, Computer Science, or a related field preferred, or equivalent experience.
-1-2 years of experience in a SOC or IT security role, with exposure to security monitoring, analysis, and incident response.
-Familiarity with security tools such as SIEM (e.g., Splunk, Microsoft Sentinel), IDS/IPS, firewalls, and endpoint detection tools (e.g., Carbon Black, CrowdStrike).
-Understanding of network protocols, operating systems (Windows, Linux), and general IT infrastructure.
-Basic knowledge of common security frameworks (e.g., NIST, ISO 27001).
-Relevant certifications preferred (e.g., CompTIA Security+, CEH, CySA+).
Job Types: Full-time, Permanent
Benefits:
- Additional leave
- Health insurance
- Maternity leave
- Professional development
Schedule:
- Afternoon shift
- Day shift
- Evening shift
- Night shift
Supplemental Pay:
- Overtime pay
Application Question(s):
- How long is your notice period?
- What is your expected salary?
Experience:
- SOC or IT security role: 1 year (Required)