Job Description :
We are seeking a SOC Analyst L1 to monitor, detect, and respond to security incidents across multi-cloud environments. The ideal candidate will have experience with SIEM tools and cloud security monitoring platforms.
Key Responsibilities :
- Monitor and analyze security events using SIEM tools such as Microsoft Sentinel, Wazuh, Splunk, and QRadar.
- Utilize Azure Security Center to monitor cloud infrastructure security.
- Work across multi-cloud environments including AWS, Azure, and GCP.
- Assist in implementing and managing SOAR workflows and automated incident response in Azure Sentinel.
- Respond to security alerts and assist in incident triage.
- Document security incidents, investigations, and resolution actions.
- Collaborate with IT and security teams to improve detection and response capabilities.
Required Skills & Qualifications :
2 – 5 years of experience in security monitoring or SOC operations.Hands-on experience with SIEM tools : Microsoft Sentinel, Wazuh, Splunk, QRadar.Experience with Azure Security Center and multi-cloud environments (AWS, Azure, GCP).Knowledge of SOAR tools and Azure Sentinel automation.Strong analytical, troubleshooting, and problem-solving skills.Good communication skills and ability to document incidents clearly.Skills Required
Splunk, Aws, Azure, Gcp