Job Summary
The SOC (Security Operations Center) Analyst plays a critical role in ensuring the security of an organization's IT infrastructure. The role involves monitoring, detecting, and responding to security incidents, vulnerabilities, and threats. The SOC Analyst is responsible for using various security tools and technologies to analyze and respond to security incidents, as well as providing recommendations for improving security measures.
Job Responsibilities
- Continuously monitor security alerts and incidents from (SIEM, EDR, Firewall, etc.) by the SOC's 24/7 operational needs.
- Analyze logs, traffic, and other data to detect potential security incidents.
- Rapidly identify, prioritize, and Triage Incidents as the initial step for the enterprise using all available CUSTOMER's log and intelligence sources.
- Act as the first responder to security incidents by analyzing, containing, and mitigating threats.
- Reporting and Documentation: maintain detailed and accurate records of security incidents and actions taken.
- Document and escalate incidents to higher levels of response as needed.
- Threat Intelligence: stay updated on the latest threat landscape, including new vulnerabilities, exploits, and attack vectors, and apply threat intelligence to identify potential security weaknesses and recommend actions.
- Coordinate with SIEM Engineers to tune detection rules and parsing issues.
- Conduct Threat Hunting activity to detect abnormal activity.
- Create a detection use case.
Job Requirements
- Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related field (or equivalent experience).
- 6+ Months of experience in a security operations center, cybersecurity, or IT security role.
- Knowledge of security tools such as SIEM, IDS/IPS, firewalls, and endpoint protection systems.
- Knowledge of network protocols, and operating systems (Windows, Linux, etc.).
- Familiarity with scripting languages (e.g., Python, PowerShell) for automation.
- Familiarity with incident response and forensic analysis tools.
- Familiarity with threat hunting.
- Understanding of threat intelligence platforms and methodologies.
- Strong analytical and problem-solving skills.
- Excellent communication skills, both verbal and written.