Job Description
We are seeking a detail-oriented and proactive Level 1 (L1) and Level 2 (L2) SOC Engineer with 2–3 years of experience in cybersecurity monitoring and incident response. This role is responsible for real-time monitoring, detection, analysis, and response to security events and threats across the organization’s infrastructure. The candidate must be flexible to work in 24 / 7 rotating shifts , including nights, weekends, and holidays.
Key Responsibilities :
- Monitor security events and alerts using SIEM tools.
- Triage alerts to determine severity, impact, and appropriate response actions.
- Investigate anomalous network activity, system logs, and endpoint behaviour to identify potential threats.
- Respond to and contain security incidents following defined SOC procedures and escalation paths.
- Perform root cause analysis (RCA) and document findings in incident reports.
- Assist with vulnerability assessments, threat intelligence, and ongoing threat hunting efforts.
- Work with IT and network teams to implement remediation steps and enhance preventive controls.
- Contribute to the development and refinement of SOC playbooks, SOPs, and response strategies.
- Stay informed about current cybersecurity trends, TTPs (Tactics, Techniques, and Procedures), threat actors, and zero-day exploits.
- Support compliance audits , internal / external security assessments, and regular security drills.
Required Qualifications :
Bachelor’s degree or Diploma in Cybersecurity, Information Technology, Computer Science, or related field.2–3 years of experience in a Security Operations Center (SOC) or equivalent cybersecurity role.Familiarity with SIEM tools, log analysis, and threat detection techniques.Support compliance audits, internal / external security assessments, and regular security drills.Support compliance audits, internal / external security assessments, and regular security drills.Experience with firewalls, IDS / IPS, antivirus, and EDR / XDR platforms.Strong analytical and troubleshooting skills with the ability to work under pressure.Excellent written and verbal communication skills for documenting and reporting incidents.Preferred Skills :
Certifications such as CompTIA Security+, CEH, CySA+, or Splunk Certified Analyst.Experience with scripting or automation (e.g., Python, PowerShell, Bash).Familiarity with EDR solutions (e.g., CrowdStrike, SentinelOne, Carbon Black).Exposure to cloud security monitoring (AWS, Azure, GCP).Knowledge of packet analysis tools (Wireshark, tcpdump) and forensic techniques.Experience contributing to SOC process improvement, alert tuning, or playbook automation.Experience supporting or participating in security audits and assessments based on frameworks such as SOC 2, ISO 27001, or NIST CSF.Hands-on experience with penetration testing tools such as Burp Suite, Qualys, Nessus, or OpenVAS to validate vulnerabilities or support security assessments.Experience securing CI / CD pipelines, including static / dynamic code analysis, container scanning, and code-to-cloud deployment monitoring.Familiarity with security tools integrated into pipelines (e.g., Snyk, SonarQube, Trivy, Checkov, or GitHub Advanced Security etc).Work Environment :
This is a 24 / 7 operations role. Candidates must be flexible to work in rotating shifts, including night shifts, weekends, and holidays, as part of a global security operations coverage model.Requirements
Hotjar, Maze, Mixpanel, figma