Job Description:
As an L1 SOC Analyst, you will be the first line of defense in monitoring, analyzing, and responding to security alerts and incidents. Working in a dynamic SOC environment, you will play a critical role in identifying potential threats, escalating security events, and ensuring the protection of our clients’ digital assets.
Responsibilities:
- Monitor and analyze security events using SIEM and other monitoring tools.
- Respond to alerts and escalate incidents as needed.
- Perform initial triage and classification of security incidents.
- Document incident details and assist in incident response activities.
- Collaborate with the L2/L3 SOC Analysts and other security teams.
- Maintain awareness of the latest security threats and trends.
- Contribute to the continuous improvement of SOC processes and procedures.
Qualifications:
- Bachelor’s degree in Information Security, Computer Science, or related field (or equivalent experience).
- Knowledge of cybersecurity fundamentals, including threat vectors, attack techniques, and defensive strategies.
- Familiarity with SIEM tools and basic incident analysis.
- Strong analytical and problem-solving skills.
- Good understanding of networking protocols and security technologies.
- Ability to work in a team and communicate effectively.
- Willingness to work in shifts (24/7 environment).
Preferred Qualifications:
- 1-2 years of experience in a similar role.
- Relevant certifications (e.g., CompTIA Security+, CEH, etc.). are prefered
- Experience with specific security tools (e.g., Splunk, CrowdStrike, Palo Alto, BeyondTrust, etc.).