Closed or Expired Job Posting This job posting is closed or has expired and is no longer open for applications.
Upload
Job Description
Serve as the first SOC tier to triage alerts.
Ensuring threat alerts are contextually analyzed escalated to next tier (if further analysis is needed).
Give feedback and comments on relevant data quality issues.
Monitor and report on data collection pipeline health.
Log security incidents and ensure adequate information is available for next-tier analysts.
Generate and distribute scheduled and ad-hoc reports.
Capable of operating independently to investigate and escalate alerts in line with operational requirements and SLAs.
Personal Skills
- Very good communication skills
- Very good analytical skills
Technical Skills
Experience requirements:
- 1-2 years working as a SOC analyst
- Previous experience with SIEM technologies (e.g. QRadar, Splunk, LogRythm, etc.)
- Good knowledge of operating systems, mainly Windows and Linux.
- Good knowledge of networking protocols, concepts and technologies.
- Good knowledge of foundational security concepts, e.g.: kill chain, defense-in-depth, systems hardening, etc.
- Knowledge of cyber threats and vulnerabilities.
- Knowledge of adversarial tactics, techniques, and procedures.
Desirable requirements:
- Bachelors in Cyber Security, Computer Science, Engineering, other related field, or equivalent experience.
- Security certifications, such as Security+, GSEC, CEH, or similar.
- Previous experience in programming/shell scripting (PERL, Python, Java, Shell, PowerShell, etc.)
- Previous experience working as a systems/network administrator.
- Previous experience configuring/implementing network security solutions (e.g. SIEM, firewalls, IPS, IDS)
- Previous experience with incident response and digital forensics.
- Previous experience as a penetration tester.
Education
Bachelor's in cyber security, Computer Science, Engineering, other related field
Job Details
Preferred Candidate