Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailWe are seeking a proactive and detail-oriented SOC Analyst to monitor detect and respond to cybersecurity incidents in real time. The role involves working in a Security Operations Center (SOC) environment analyzing security alerts investigating suspicious activities and escalating threats when necessary. The ideal candidate will have strong technical knowledge of security tools threat detection and incident response processes.
Monitor and analyze security events and alerts from SIEM IDS/IPS EDR firewalls and other security tools.
Investigate and triage security incidents determining severity and impact.
Respond to cybersecurity threats by containing mitigating and documenting incidents.
Conduct log analysis packet analysis and threat hunting activities.
Assist in developing and tuning correlation rules detection signatures and playbooks.
Escalate critical incidents to senior analysts or incident response teams.
Collaborate with IT DevOps and security engineers to ensure timely remediation.
Prepare incident reports threat intelligence summaries and SOC metrics dashboards.
Participate in red team/blue team exercises to improve detection and response.
Stay updated on the latest cyber threats vulnerabilities and attack techniques.
Bachelors degree in Cybersecurity Information Technology or related field (or equivalent experience).
13 years of experience in cybersecurity operations SOC or incident response.
Knowledge of common attack techniques malware behavior and threat actor tactics (MITRE ATT&CK framework).
Hands-on experience with SIEM tools (Splunk QRadar ELK Microsoft Sentinel ArcSight etc.).
Familiarity with endpoint protection (EDR) firewalls IDS/IPS and threat intelligence platforms.
Basic knowledge of network protocols operating systems (Windows Linux) and cloud environments.
Strong analytical problem-solving and communication skills.
Security certifications such as:
CompTIA Security / CySA
GIAC Security Essentials (GSEC)
GIAC Certified Incident Handler (GCIH)
Certified SOC Analyst (CSA)
Experience with threat hunting and malware analysis.
Familiarity with SOAR platforms (Security Orchestration Automation & Response).
Knowledge of compliance frameworks (ISO 27001 NIST GDPR PCI-DSS HIPAA).
Competitive salary with performance bonuses.
Comprehensive health dental and vision insurance.
Certification sponsorship and professional development programs.
Flexible work schedule (onsite hybrid remote options).
Career growth opportunities into SOC Lead Threat Hunter or Incident Response Specialist roles.
Full Time