DescriptionResponsibilities & duties:
- First line of analysis and handling of security alerts coming from various platforms and tools in 24/7 operation schedule
- Continuous monitoring of the environment for unusual or potentially malicious activity following established operational procedures.
- Initial alert triage assessing severity and business impact and escalating according to the process
- Support for operational processes including maintaining up-to-date procedures checklists and runbooks.
- Performing basic investigative actions based on available data logs and SOC tooling.
- Documenting actions taken and ensuring high-quality records in ticketing systems.
- Collaborating with higher support levels (Tier 2 Intelligence analysts security engineers) to ensure effective information flow and improve analysis quality.
Qualifications required:
- Basic understanding of IT systems networks and operating environments.
- Strong interest in cybersecurity and willingness to learn.
- Possess good logical and analytical skills to help in analysis of security events/incidents
- Good communication and teamwork skills.
- Effective verbal and written communication skills
Nice to Have:
- Exposure to scripting or automation (e.g. Python PowerShell).
- Familiarity with log analysis or basic security concepts.
- Understanding of common network services (web mail DNS authentication)
- Experiencing with log collection/search tools (SIEM data lakes)
- Participation in cybersecurity labs certifications or competitions.
- Understanding of common attack techniques and tactics (e.g. phishing lateral movement privilege escalation).
#LI-YK1
Required Experience:
IC
DescriptionResponsibilities & duties:First line of analysis and handling of security alerts coming from various platforms and tools in 24/7 operation scheduleContinuous monitoring of the environment for unusual or potentially malicious activity following established operational procedures.Initial al...
DescriptionResponsibilities & duties:
- First line of analysis and handling of security alerts coming from various platforms and tools in 24/7 operation schedule
- Continuous monitoring of the environment for unusual or potentially malicious activity following established operational procedures.
- Initial alert triage assessing severity and business impact and escalating according to the process
- Support for operational processes including maintaining up-to-date procedures checklists and runbooks.
- Performing basic investigative actions based on available data logs and SOC tooling.
- Documenting actions taken and ensuring high-quality records in ticketing systems.
- Collaborating with higher support levels (Tier 2 Intelligence analysts security engineers) to ensure effective information flow and improve analysis quality.
Qualifications required:
- Basic understanding of IT systems networks and operating environments.
- Strong interest in cybersecurity and willingness to learn.
- Possess good logical and analytical skills to help in analysis of security events/incidents
- Good communication and teamwork skills.
- Effective verbal and written communication skills
Nice to Have:
- Exposure to scripting or automation (e.g. Python PowerShell).
- Familiarity with log analysis or basic security concepts.
- Understanding of common network services (web mail DNS authentication)
- Experiencing with log collection/search tools (SIEM data lakes)
- Participation in cybersecurity labs certifications or competitions.
- Understanding of common attack techniques and tactics (e.g. phishing lateral movement privilege escalation).
#LI-YK1
Required Experience:
IC
View more
View less