Job Summary
Monitor, analyze, and respond to security alerts across diverse customer and internal environments, driving timely incident management and escalation to protect organizational assets and maintain security posture.
Responsibilities
- Monitor SIEM and security tools across multiple tenants to detect and analyze security alerts in real time
- Triage and investigate security events using logs, EDR, NDR, and threat intelligence to identify potential threats
- Perform initial incident response actions according to established playbooks to contain and mitigate risks
- Escalate security incidents with clear, accurate documentation to relevant stakeholders for further action
- Maintain detailed incident tickets and manage customer communications to ensure transparency and resolution tracking
- Apply knowledge of common attack techniques to enhance alert enrichment and investigation accuracy
- Follow defined processes and meet SLAs to ensure consistent and effective security operations
- Communicate findings and analysis clearly and professionally to support decision-making and incident resolution
Required competencies and certifications
- Diploma in Information Technology or equivalent qualification
- Minimum 2 years of experience as a security analyst in a Security Operations Center (SOC) with hands-on expertise in monitoring, triage, analysis, and incident management of real-time security events
Preferred competencies and qualifications
- Familiarity with incident response fundamentals and EDR investigation techniques
- Certifications such as GCIH, GSOC, or CySA+ are advantageous
To quick apply:
https://jobs.hackertrail.com/hackertrail/job/soc-analyst