The SOC Analyst assists the SOC Manager by monitoring and analyzing the bank s IT infrastructure to detect investigate and respond to cybersecurity threats in real time. Using SIEM IDS EDR and threat intelligence platforms the analyst identifies and mitigates risks across networks and endpoints.
Responsibilities include root cause analysis incident remediation and escalation of complex threats with detailed reporting to management regulators and stakeholders in line with BoG directives PCI DSS and ISO 27001. The role also supports SOC process optimization threat hunting SOARbased automation and tracks SOC performance metrics to strengthen the bank s security posture.
Skills :
- Conduct 24/7 surveillance of the bank s IT infrastructure including networks applications and endpoints using SIEM NDR EDR and other security monitoring tools to detect and analyze anomalies and potential threats.
- Assess and prioritize security and business risks coordinating containment eradication recovery and root cause analysis for all incidents to prevent recurrence.
- Analyze logs network traffic and alerts to detect malicious activity escalating issues per defined SOC protocols.
- Utilize threat intelligence feeds to enrich investigations and correlate findings with global threat landscapes.
- Ensure thorough tracking documentation and closure of incidents providing comprehensive reports to SOC Manager for review.
- Work with internal teams to ensure new systems and applications produce necessary logs integrated into SIEM for effective monitoring.
- Assist in the SOC Manager in the development and refinement of incident response playbooks and SOAR automation workflows to improve response times.
- Stay current on emerging threats vulnerabilities and best practices to enhance the Bank s security posture.
- Track and improve SOC performance through key metrics such as MTTD and MTTR.
- Clearly articulate complex security incidents and concepts to management SOC Manager and relevant stakeholders in understandable terms.