SOC and Incident Handling Analyst


We are seeking a highly capable Security Operations Center (SOC) and Incident Handling Analyst (Tier I) with hands-on experience utilizing different SIEM types. This role is key in monitoring and defending our cloud-based infrastructure against evolving cybersecurity threats. You’ll be the first line of defense in detecting and responding to security incidents across our environment.

To achieve results, you’ll need:

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent work experience.

  • Experience in a SOC or cybersecurity incident response role.

  • Basic knowledge of cybersecurity solutions (SIEM, SOAR, Firewalls, etc.).

  • Understanding of logging processes and principles in information systems.

  • Fundamental knowledge of networking concepts (OSI model, LAN/WAN, IDS/IPS, VPN, etc.).

  • Familiarity with the MITRE ATT&CK Framework (Enterprise) and its applications.

  • Understanding of data encryption principles.

  • Basic experience working with ticketing systems.

  • Hands-on experience with SIEM or SOAR solutions is a plus.

  • Knowledge of OWASP TOP 10.

  • Ability to learn quickly and adapt to new environments.

  • Strong analytical thinking skills.

  • High sense of responsibility and attention to detail.

  • Ability to work under pressure, prioritize tasks, and respond to critical incidents promptly.


Responsibilities:
  • Continuous monitoring of SIEM dashboards and real-time alerting systems.
  • Shift-based work in a 24/7 operational environment.

  • Collecting statistics and relevant data regarding alerts/events.

  • Participation in cybersecurity incident investigations.

  • Triage and categorization of security alerts.

  • Working with SIEM and SOAR platforms.

  • Configuration and maintenance of information security systems.

  • Development of correlation rules and automated response playbooks.

  • Documenting all actions taken during alert handling and incident response.



Will be a plus:
  • Certifications include CompTIA CySA+, GCIH, GCIA, CEH, AWS Security Specialty, or similar.

  • Experience with infrastructure-as-code (IaC), cloud-native security tools, or DevSecOps practices.

  • Proficiency in scripting (Python, Bash, or PowerShell) to support automation and investigations.

  • Exposure to security automation tools and SOAR integrations.



Working conditions:
  • SOC Analyst Tier 1 works in a shift-based 24/7 SOC  environment.

  • Shifts may include night shifts, weekends and public holidays according to the approved duty roster.

  • Analyst must be available for real-time incident response during assigned shifts and adhere to defined (SLAs).




 

Published 20 January
24 views
·
3 applications
Connected to ATS
To apply for this and other jobs on Djinni login or signup.
Loading...