SOC and Incident Handling Analyst
We are seeking a highly capable Security Operations Center (SOC) and Incident Handling Analyst (Tier I) with hands-on experience utilizing different SIEM types. This role is key in monitoring and defending our cloud-based infrastructure against evolving cybersecurity threats. You’ll be the first line of defense in detecting and responding to security incidents across our environment.
To achieve results, you’ll need:
Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent work experience.
Experience in a SOC or cybersecurity incident response role.
Basic knowledge of cybersecurity solutions (SIEM, SOAR, Firewalls, etc.).
Understanding of logging processes and principles in information systems.
Fundamental knowledge of networking concepts (OSI model, LAN/WAN, IDS/IPS, VPN, etc.).
Familiarity with the MITRE ATT&CK Framework (Enterprise) and its applications.
Understanding of data encryption principles.
Basic experience working with ticketing systems.
Hands-on experience with SIEM or SOAR solutions is a plus.
Knowledge of OWASP TOP 10.
Ability to learn quickly and adapt to new environments.
Strong analytical thinking skills.
High sense of responsibility and attention to detail.
Ability to work under pressure, prioritize tasks, and respond to critical incidents promptly.
Responsibilities:
- Continuous monitoring of SIEM dashboards and real-time alerting systems.
Shift-based work in a 24/7 operational environment.
Collecting statistics and relevant data regarding alerts/events.
Participation in cybersecurity incident investigations.
Triage and categorization of security alerts.
Working with SIEM and SOAR platforms.
Configuration and maintenance of information security systems.
Development of correlation rules and automated response playbooks.
Documenting all actions taken during alert handling and incident response.
Will be a plus:
Certifications include CompTIA CySA+, GCIH, GCIA, CEH, AWS Security Specialty, or similar.
Experience with infrastructure-as-code (IaC), cloud-native security tools, or DevSecOps practices.
Proficiency in scripting (Python, Bash, or PowerShell) to support automation and investigations.
Exposure to security automation tools and SOAR integrations.
Working conditions:
SOC Analyst Tier 1 works in a shift-based 24/7 SOC Â environment.
Shifts may include night shifts, weekends and public holidays according to the approved duty roster.
Analyst must be available for real-time incident response during assigned shifts and adhere to defined (SLAs).