We are seeking a proactive and skilled SOC Analyst with 4 to 5 years of experience in monitoring, detecting, analyzing, and responding to cybersecurity incidents. The ideal candidate will be responsible for handling day-to-day security alerts, ensuring adherence to security policies, and helping improve the overall security posture of the organization.
Key Responsibilities :
- Monitor and analyze logs, alerts, and security events using SIEM tools (e.g., Splunk, IBM QRadar, ArcSight, or Microsoft Sentinel).
- Detect and respond to security incidents such as phishing, malware infections, privilege escalation, and data exfiltration.
- Perform initial triage, investigation, and escalation of potential threats and vulnerabilities.
- Conduct incident response , including containment, eradication, recovery, and post-incident analysis.
- Work with other IT / security teams to investigate security breaches and identify root causes.
- Develop and maintain incident response documentation , standard operating procedures (SOPs), and knowledge base articles.
- Assist in threat hunting and proactive detection of advanced persistent threats (APT).
- Analyze threat intelligence feeds and correlate data with internal telemetry.
- Participate in vulnerability management by reviewing scan results and recommending remediations.
- Stay up-to-date with evolving threat landscapes and recommend improvements to detection and response capabilities.
Required Skills & Qualifications :
4–5 years of hands-on experience in a Security Operations Center (SOC) or equivalent cybersecurity role.Strong understanding of network protocols, operating systems (Windows / Linux) , and security tools.Experience working with SIEM platforms , endpoint detection tools, and forensic analysis tools.Knowledge of cybersecurity frameworks (NIST, MITRE ATT&CK, ISO 27001).Familiarity with log analysis , packet capture tools (Wireshark) , and threat intelligence platforms .Good communication skills and ability to document technical information clearly.Ability to work in a 24 / 7 or rotating shift environment (if required).Preferred Skills (Good to Have) :
Experience with cloud security monitoring (e.g., AWS, Azure Security Center).Familiarity with SOAR tools and automated response workflows .Relevant certifications such as :CompTIA Security+CEH (Certified Ethical Hacker)GIAC (GCIH, GCIA)Splunk Certified User / AnalystScripting skills (e.g., Python, Bash) for automating SOC tasks.Skills Required
Python, Bash, gcih, gcia , Aws, Azure