We are looking for a passionate and detail-oriented SOC Analyst to join our cybersecurity team. As a SOC Analyst, you will monitor, detect, investigate, and respond to security events and incidents to ensure the integrity, confidentiality, and availability of our systems and data.
Bachelor’s degree in Computer Science, IT, or a related field.
1–3 years of experience in cybersecurity or IT operations.
Familiarity with SIEM tools (e.g., Splunk, IBM Q Radar, Arc Sight).
Basic understanding of TCP/IP, firewalls, IDS/IPS, malware, phishing, etc.
Good analytical and problem-solving skills.
Willingness to work in shifts (if 24/7 SOC).
Monitor security alerts and dashboards (SIEM tools) 24/7.
Investigate and analyze potential security threats and incidents.
Escalate real security incidents to senior analysts or managers.
Provide initial incident response and documentation.
Perform log analysis from firewalls, IDS/IPS, antivirus, servers, etc.
Help improve detection and response processes.
Create daily/weekly security reports.
Industry certifications like CompTIA Security+, CEH, or Splunk Certified User.
Experience in handling incident response or forensic analysis.