
Search by job, company or skills
Job Description:
* Respond to and investigate system, service, or network attacks using forensic and incident response techniques.
* Work directly with Security Engineers to develop proactive defenses, automation, and enhanced detection use cases within SIEM/SOC platforms.
* Monitor security event logs to identify suspicious activity and potential security incidents.
* Understand SOC processes and procedures and apply them appropriately based on client environments.
* Escalate advanced or complex threats to L3 Senior Analysts when necessary.
* Support digital forensics, threat investigations, and incident analysis.
* Collaborate with IT and security teams to contain, mitigate, and resolve security incidents.
* Perform proactive threat hunting and support vulnerability identification efforts.
* Maintain and update SOC dashboards, reports, and documentation.
* Participate in internal security awareness initiatives and operational documentation.
* Work in a 24/7 SOC environment, following rotating 8-hour shifts across 3 daily cycles with a team of six analysts.
Requirements:
* Bachelor's degree in Computer Science, Information Systems, or a related field.
* 25 years of professional experience in cybersecurity or IT security.
* Strong knowledge of SIEM/SOC platforms such as FortiSIEM, Splunk, QRadar, AlienVault USM Anywhere, or similar.
* Strong analytical, investigative, and troubleshooting skills.
* Excellent command of English (written and spoken).
Job ID: 133909611