The SOC Analyst / Security Operations Specialist monitors detects and responds to cybersecurity threats ensuring timely containment and mitigation of risks across enterprise systems.
Key Responsibilities
1. Monitor & Detect
Continuously monitor systems networks and logs for threats using SIEM tools.
2. Incident Response
Investigate contain and resolve security incidents.
Document findings and maintain incident records according to organizational standards.
3. Threat Intelligence
Analyze threat data and update detection rules to address emerging risks.
4. Vulnerability Management
Identify prioritize and coordinate patching of security weaknesses.
5. Tool Management
Maintain and optimize SOC tools including SIEM EDR IDS/IPS and SOAR platforms.
6. Reporting & Compliance
Prepare security reports and ensure adherence to organizational policies and standards.
7. Collaboration & Awareness
Work with other IT and security teams to promote cybersecurity best practices.
Bachelors degree in Computer Science Information Security IT or equivalent hands-on experience.
Relevant certifications may substitute for a degree for L1 roles.
Solid understanding of networking (IP DNS HTTP TLS) Windows/Linux environments cloud platforms and security fundamentals.
Hands-on experience with SIEM and EDR tools (e.g. QRadar Sentinel; TrendMicro Defender).
Ability to write basic queries (KQL/SPL) and follow incident runbooks.
Clear written and verbal communication skills.
L1: 35 years handling alerts and investigations including on-call exposure.
Submission date: Please submit CVs on or before 02nd December 2025.
IT Services and IT Consulting