Job Title Security Operations Center (SOC) Analyst
Overview
We are seeking a motivated SOC Analyst to join our team. This is a unique opportunity to gain hands-on experience in detecting, analyzing, and responding to cybersecurity threats while also contributing to research, automation, and advanced security initiatives.
This role blends operational monitoring with coding / scripting and R&D, making it ideal for candidates who want to grow into well-rounded cybersecurity professionals—not just alert responders. Candidates must be eager to learn, adaptable to rotating shifts (including night shifts), and passionate about making an impact in cybersecurity defense.
Key Responsibilities
- Monitor, analyze, and respond to security alerts, incidents, and potential threats within a 24 / 7 SOC environment.
- Perform initial triage, investigation, and escalation of security events, ensuring timely and accurate threat response.
- Develop and improve automation scripts, tools, and playbooks (primarily in Python) to enhance SOC efficiency and reduce manual workload.
- Participate in threat research : analyzing emerging attack vectors, malware, and vulnerabilities to strengthen detection strategies.
- Contribute to security R&D projects—experimenting with new technologies, writing proof-of-concept scripts, and implementing detection logic.
- Collaborate with senior analysts, threat hunters, and incident response on complex investigations.
- Maintain documentation of incidents, findings, and process improvements.
- Continuously upgrade skills through research, and certifications.
Requirements
Bachelor's degree in Computer Science, Information Security, or related discipline (or equivalent experience).Strong foundation in networking, operating systems, and security fundamentals (TCP / IP, logs, firewalls, SIEM, IDS / IPS).Hands-on coding / scripting skills – preferably in Python (PowerShell, Bash, or other scripting languages are a plus).Familiarity with SIEM solutions (Splunk, QRadar, Elastic, etc.) and log analysis.Analytical and troubleshooting ability under pressure.Good written and verbal communication skills.Strong willingness to work in rotational shifts (morning / afternoon / evening).Preferred Skills
Certifications : CompTIA Security+, CySA+, CEH, or equivalent. are a plusExposure to malware analysis, threat intelligence,Experience in creating custom detection rules or scripts (YARA, Sigma, Snort, etc.). are plusPrevious internship or hands-on project experience in a SOC, cybersecurity lab, or capture-the-flag (CTF) competitions.Shift Details
6 Day work week, 9hour shiftRotating shifts (Morning / Evening / Night)Must be comfortable with night shifts and flexible to work weekends / holidays as part of the rotation.Benefits
Gain real SOC experience in a fast-paced cybersecurity environment.Exposure to advanced tools, frameworks, and research projects that go beyond monitoring.Learning and certification support for relevant cybersecurity credentials.Clear career growth opportunities into Mid-level SOC, Threat Hunting, or Incident Response roles.Show more
Show less
Skills Required
Powershell, Ids, Siem, Bash, Splunk, Ips, Firewalls, Python, Qradar