SOC Analyst

We are seeking a diligent and proactive SOC Analyst to join our cybersecurity team. The SOC Analyst plays a critical role in monitoring, detecting, and responding to security incidents to ensure the protection of our organization’s information and assets. If you are passionate about cybersecurity and have a strong analytical mindset, we encourage you to apply for this exciting opportunity.

Key Responsibilities:

Security Monitoring: Monitor security alerts and incidents in real-time using security information and event management (SIEM) systems and other security tools.
Incident Detection: Identify and analyze security incidents, including malware infections, data breaches, and unauthorized access.
Threat Intelligence: Stay informed about the latest cybersecurity threats and vulnerabilities by analyzing threat intelligence feeds and reports.
Investigation: Conduct in-depth investigations into security incidents, including root cause analysis and impact assessment.
Incident Response: Develop and execute incident response plans, working collaboratively with cross-functional teams to mitigate security threats and minimize damage.
Vulnerability Management: Assist in the identification and remediation of security vulnerabilities by conducting vulnerability assessments and patch management.
Log Analysis: Analyze log data from various sources to identify and respond to security events.
Security Policies: Ensure compliance with security policies, procedures, and best practices.
Documentation: Create and maintain detailed documentation of incidents, investigations, and response activities.
Reporting: Prepare and present security reports to management and stakeholders, summarizing security incidents, trends, and metrics.

Qualifications:

Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent work experience).
Proven experience as a SOC Analyst or in a related cybersecurity role.
Knowledge of cybersecurity frameworks, standards, and best practices (e.g., NIST, ISO 27001).
Familiarity with SIEM tools (e.g., Splunk, ELK, ArcSight) and other security technologies.
Strong understanding of network protocols and security infrastructure.
Analytical mindset with the ability to identify and respond to security threats effectively.
Excellent problem-solving and critical-thinking skills.
Relevant certifications (e.g., CompTIA Security+, Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM)) are a plus.
Strong communication skills, both written and verbal. • Ability to work in a fast-paced and dynamic environment.

Preferred Qualifications:

Experience with cloud security and cloud service providers (e.g., AWS, Azure, GCP).
Knowledge of threat hunting and threat detection methodologies.
Familiarity with scripting or programming languages for automation (e.g., Python, PowerShell, Bash).
Understanding of penetration testing and ethical hacking concepts.
Previous experience with incident response tools and procedures

This job has expired or closed. Application is no longer allowed

Apply via :