29 Soc Analyst jobs in Pakistan

SOC Analyst

Lahore, Punjab Prime System Solutions

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

Position Title: Security Analyst (SOC Analyst)

Job Type: Full-time

The Security Analyst I role is a critical position within the organization. The primary function of the role will be to provide monitoring of deployed customer environments for security events. This includes establishing the extent of a threat, the business impact, and advising the most suitable course of action to contain and remedy the event. A Cybersecurity Technician will serve as an escalation point to the subject matter expert for in-depth cybersecurity events and must be able to communicate effectively to all stakeholders during the event management process.

Key Responsibilities

  • Manage the security event monitoring and incident response ticket queues and triage as appropriate to meet the established service level agreements
  • Promptly transfer cybersecurity tickets to the client or internal point of contact
  • Clearly convey indicators of compromise, isolation, and remediation steps
  • Analyze and interpret system, security, and application logs in order to diagnose faults, spot abnormal behavior, and rule out false positives
  • Effectively utilize End Detection and Response tools to investigate alerts, anomalies, and build accurate timelines related to possible compromise
  • Follow established procedures to investigate, escalate, contain, or eradicate malicious activity
  • Develop and deliver written and oral reports to clients, teammates, and management to aggregate and communicate security information and metrics
  • Provide input and recommendations to improve internal processes and procedures related to SOC duties and responsibilities
  • Participate in threat-hunting activities and other special projects as required
  • Understand and follow, our set of standards and processes that produce a predictable result for the client. You must be aware of and maintain our standards.

Additional Responsibilities

  • Maintain accurate and real-time timesheets, record complete and accurate notes of troubleshooting and communication with clients
  • Receive mentoring and feedback from peers and others
  • Where appropriate, escalate complicated issues to a more senior resource or other appropriate teams
  • Review Tickets with Manager
  • Actively Participate in Team Huddles, L10 Meetings, One on One Meetings, and any other Team Meetings
  • Create and update documentation when changes occur, or when discoveries are made
  • Attend monthly training & team meetings as required
  • Additional duties as required

Skills, Knowledge, and Expertise

  • Two years work experience in the Information Security or related fields
  • Two or more current security-related industry certifications
  • Experience with SIEM platforms, firewall management, and endpoint detection and response platforms
  • One year or more of experience with EDR solutions, ESGs, vulnerability management, and content filtering
  • Good problem-solving and decision-making skills; ability to understand and analyze complex issues
  • Self-motivated, detail-oriented, highly organized, and able to handle a variety of tasks and responsibilities in an efficient manner with a high level of quality
  • One of the following certifications preferred: CompTIA Security+, CompTIA CySA+, CCNA, C|EH, SSCP, or equivalent
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

SOC Analyst

Lahore, Punjab Prime System Solutions

Posted 17 days ago

Job Viewed

Tap Again To Close

Job Description

Position Title:

Security Analyst (SOC Analyst) Job Type: Full-time The Security Analyst I role is a critical position within the organization. The primary function of the role will be to provide monitoring of deployed customer environments for security events. This includes establishing the extent of a threat, the business impact, and advising the most suitable course of action to contain and remedy the event. A Cybersecurity Technician will serve as an escalation point to the subject matter expert for in-depth cybersecurity events and must be able to communicate effectively to all stakeholders during the event management process. Key Responsibilities Manage the security event monitoring and incident response ticket queues and triage as appropriate to meet the established service level agreements Promptly transfer cybersecurity tickets to the client or internal point of contact Clearly convey indicators of compromise, isolation, and remediation steps Analyze and interpret system, security, and application logs in order to diagnose faults, spot abnormal behavior, and rule out false positives Effectively utilize End Detection and Response tools to investigate alerts, anomalies, and build accurate timelines related to possible compromise Follow established procedures to investigate, escalate, contain, or eradicate malicious activity Develop and deliver written and oral reports to clients, teammates, and management to aggregate and communicate security information and metrics Provide input and recommendations to improve internal processes and procedures related to SOC duties and responsibilities Participate in threat-hunting activities and other special projects as required Understand and follow, our set of standards and processes that produce a predictable result for the client. You must be aware of and maintain our standards. Additional Responsibilities Maintain accurate and real-time timesheets, record complete and accurate notes of troubleshooting and communication with clients Receive mentoring and feedback from peers and others Where appropriate, escalate complicated issues to a more senior resource or other appropriate teams Review Tickets with Manager Actively Participate in Team Huddles, L10 Meetings, One on One Meetings, and any other Team Meetings Create and update documentation when changes occur, or when discoveries are made Attend monthly training & team meetings as required Additional duties as required Skills, Knowledge, and Expertise Two years work experience in the Information Security or related fields Two or more current security-related industry certifications Experience with SIEM platforms, firewall management, and endpoint detection and response platforms One year or more of experience with EDR solutions, ESGs, vulnerability management, and content filtering Good problem-solving and decision-making skills; ability to understand and analyze complex issues Self-motivated, detail-oriented, highly organized, and able to handle a variety of tasks and responsibilities in an efficient manner with a high level of quality One of the following certifications preferred: CompTIA Security+, CompTIA CySA+, CCNA, C|EH, SSCP, or equivalent

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Sr. SOC Analyst

Sindh, Sindh Pakistan Single Window (PSW)

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

Get AI-powered advice on this job and more exclusive features.

  • Perform day-to-day operations of the Security Operations Center (SOC), including monitoring security alerts, incidents, and events
  • Administer and maintain security monitoring tools, including Security Information and Event Management (SIEM), Endpoint Detection & Response (EDR) and other security technologies
  • Conduct root cause analysis of security incidents and recommend containment and remediation measures
  • Provide tiered support for security incidents and events, including incident triage, escalation, and resolution
  • Monitor the health and performance of SOC infrastructure components
  • Collaborate with cross-functional teams to respond and mitigate security incidents, including coordinating incident response activities and communicating with stakeholders
  • Perform proactive threat hunting and security monitoring to identify and respond to potential security threats and vulnerabilities
  • Develop and maintain custom parsers for log sources to ensure accurate data normalization and event correlation within the SIEM
  • Onboard and validate log sources in the SIEM platform to ensure asset coverage and visibility
  • Participate in security incident response exercises and tabletop simulations to test and improve incident response procedures
  • Assist with SOC administration tasks, including user access management, tool configuration, fine tuning, and system maintenance/upgrades
  • Develop & update use-cases, SOC policies, procedures, guidelines in alignment with industry standards and regulatory requirements
  • Conduct post-incident analysis and implement improvements to prevent future incidents
  • Assist in the configuration, tuning, patching, and maintenance of SIEM
  • Any other related duty assigned by the Security Ops Lead/ HOD IS

  • Perform day-to-day operations of the Security Operations Center (SOC), including monitoring security alerts, incidents, and events
  • Administer and maintain security monitoring tools, including Security Information and Event Management (SIEM), Endpoint Detection & Response (EDR) and other security technologies
  • Conduct root cause analysis of security incidents and recommend containment and remediation measures
  • Provide tiered support for security incidents and events, including incident triage, escalation, and resolution
  • Monitor the health and performance of SOC infrastructure components
  • Collaborate with cross-functional teams to respond and mitigate security incidents, including coordinating incident response activities and communicating with stakeholders
  • Perform proactive threat hunting and security monitoring to identify and respond to potential security threats and vulnerabilities
  • Develop and maintain custom parsers for log sources to ensure accurate data normalization and event correlation within the SIEM
  • Onboard and validate log sources in the SIEM platform to ensure asset coverage and visibility
  • Participate in security incident response exercises and tabletop simulations to test and improve incident response procedures
  • Assist with SOC administration tasks, including user access management, tool configuration, fine tuning, and system maintenance/upgrades
  • Develop & update use-cases, SOC policies, procedures, guidelines in alignment with industry standards and regulatory requirements
  • Conduct post-incident analysis and implement improvements to prevent future incidents
  • Assist in the configuration, tuning, patching, and maintenance of SIEM
  • Any other related duty assigned by the Security Ops Lead/ HOD IS

Requirements

  • Bachelor's degree in technology/engineering/Information Security related field required
  • Minimum 2 to 3 years of hands-on experience in SOC and information security in a large enterprise environment
  • Strong understanding of SIEM, SOC operations and security monitoring principles
  • Experience with SIEM administration, including asset integration, parsing, creating correlation rules, custom dashboards, and reports
  • Proficiency in conducting security investigations and incident response activities
  • Strong knowledge of security technologies such as IDS/IPS, firewalls, WAF, PAM, DLP, Endpoint Detection and Response (EDR), SOAR, and network security monitoring (NSM)
  • Ability to analyze security event data and identify indicators of compromise (IOCs) and security anomalies
  • Excellent communication and collaboration skills, with the ability to work effectively in a team environment
  • Attention to detail and strong problem-solving skills

Benefits

  • Competitive salary
  • Fuel Card
  • Health benefits
  • Professional development opportunities
  • Inclusive work culture & much more
Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries IT Services and IT Consulting

Referrals increase your chances of interviewing at Pakistan Single Window (PSW) by 2x

Sign in to set job alerts for “Security Operations Center Analyst” roles.

Karachi Division, Sindh, Pakistan 6 days ago

Karachi Division, Sindh, Pakistan 1 month ago

Karachi Division, Sindh, Pakistan 1 month ago

Microsoft Sentinel Security Engineer (XDR / E5 Security Stack)

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Sr. SOC Analyst

Sindh, Sindh Pakistan Single Window

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

  • Perform day-to-day operations of the Security Operations Center (SOC), including monitoring security alerts, incidents, and events.
  • Administer and maintain security monitoring tools, including Security Information and Event Management (SIEM), Endpoint Detection & Response (EDR) and other security technologies.
  • Conduct root cause analysis of security incidents and recommend containment and remediation measures.
  • Provide tiered support for security incidents and events, including incident triage, escalation, and resolution.
  • Monitor the health and performance of SOC infrastructure components.
  • Collaborate with cross-functional teams to respond and mitigate security incidents, including coordinating incident response activities and communicating with stakeholders.
  • Perform proactive threat hunting and security monitoring to identify and respond to potential security threats and vulnerabilities.
  • Develop and maintain custom parsers for log sources to ensure accurate data normalization and event correlation within the SIEM.
  • Onboard and validate log sources in the SIEM platform to ensure asset coverage and visibility.
  • Participate in security incident response exercises and tabletop simulations to test and improve incident response procedures.
  • Assist with SOC administration tasks, including user access management, tool configuration, fine tuning, and system maintenance/upgrades.
  • Develop & update use-cases, SOC policies, procedures, guidelines in alignment with industry standards and regulatory requirements.
  • Conduct post-incident analysis and implement improvements to prevent future incidents.
  • Assist in the configuration, tuning, patching, and maintenance of SIEM.
  • Any other related duty assigned by the Security Ops Lead/ HOD IS.
  • Bachelor’s degree in technology/engineering/Information Security related field required.
  • Minimum 2 to 3 years of hands-on experience in SOC and information security in a large enterprise environment.
  • Strong understanding of SIEM, SOC operations and security monitoring principles.
  • Experience with SIEM administration, including asset integration, parsing, creating correlation rules, custom dashboards, and reports.
  • Proficiency in conducting security investigations and incident response activities.
  • Strong knowledge of security technologies such as IDS/IPS, firewalls, WAF, PAM, DLP, Endpoint Detection and Response (EDR), SOAR, and network security monitoring (NSM).
  • Ability to analyze security event data and identify indicators of compromise (IOCs) and security anomalies.
  • Excellent communication and collaboration skills, with the ability to work effectively in a team environment.
  • Attention to detail and strong problem-solving skills.
  • Competitive salary
  • Fuel Card
  • Health benefits
  • Professional development opportunities
  • Inclusive work culture & much more
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Sr. SOC Analyst

Karachi, Sindh Pakistan Single Window

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

Perform day-to-day operations of the Security Operations Center (SOC), including monitoring security alerts, incidents, and events. Administer and maintain security monitoring tools, including Security Information and Event Management (SIEM), Endpoint Detection & Response (EDR) and other security technologies. Conduct root cause analysis of security incidents and recommend containment and remediation measures. Provide tiered support for security incidents and events, including incident triage, escalation, and resolution. Monitor the health and performance of SOC infrastructure components. Collaborate with cross-functional teams to respond and mitigate security incidents, including coordinating incident response activities and communicating with stakeholders. Perform proactive threat hunting and security monitoring to identify and respond to potential security threats and vulnerabilities. Develop and maintain custom parsers for log sources to ensure accurate data normalization and event correlation within the SIEM. Onboard and validate log sources in the SIEM platform to ensure asset coverage and visibility. Participate in security incident response exercises and tabletop simulations to test and improve incident response procedures. Assist with SOC administration tasks, including user access management, tool configuration, fine tuning, and system maintenance/upgrades. Develop & update use-cases, SOC policies, procedures, guidelines in alignment with industry standards and regulatory requirements. Conduct post-incident analysis and implement improvements to prevent future incidents. Assist in the configuration, tuning, patching, and maintenance of SIEM. Any other related duty assigned by the Security Ops Lead/ HOD IS. Bachelor’s degree in technology/engineering/Information Security related field required. Minimum 2 to 3 years of hands-on experience in SOC and information security in a large enterprise environment. Strong understanding of SIEM, SOC operations and security monitoring principles. Experience with SIEM administration, including asset integration, parsing, creating correlation rules, custom dashboards, and reports. Proficiency in conducting security investigations and incident response activities. Strong knowledge of security technologies such as IDS/IPS, firewalls, WAF, PAM, DLP, Endpoint Detection and Response (EDR), SOAR, and network security monitoring (NSM). Ability to analyze security event data and identify indicators of compromise (IOCs) and security anomalies. Excellent communication and collaboration skills, with the ability to work effectively in a team environment. Attention to detail and strong problem-solving skills. Competitive salary Fuel Card Health benefits Professional development opportunities Inclusive work culture & much more

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Sr. SOC Analyst

Karachi, Sindh Pakistan Single Window (PSW)

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

Get AI-powered advice on this job and more exclusive features. Perform day-to-day operations of the Security Operations Center (SOC), including monitoring security alerts, incidents, and events Administer and maintain security monitoring tools, including Security Information and Event Management (SIEM), Endpoint Detection & Response (EDR) and other security technologies Conduct root cause analysis of security incidents and recommend containment and remediation measures Provide tiered support for security incidents and events, including incident triage, escalation, and resolution Monitor the health and performance of SOC infrastructure components Collaborate with cross-functional teams to respond and mitigate security incidents, including coordinating incident response activities and communicating with stakeholders Perform proactive threat hunting and security monitoring to identify and respond to potential security threats and vulnerabilities Develop and maintain custom parsers for log sources to ensure accurate data normalization and event correlation within the SIEM Onboard and validate log sources in the SIEM platform to ensure asset coverage and visibility Participate in security incident response exercises and tabletop simulations to test and improve incident response procedures Assist with SOC administration tasks, including user access management, tool configuration, fine tuning, and system maintenance/upgrades Develop & update use-cases, SOC policies, procedures, guidelines in alignment with industry standards and regulatory requirements Conduct post-incident analysis and implement improvements to prevent future incidents Assist in the configuration, tuning, patching, and maintenance of SIEM Any other related duty assigned by the Security Ops Lead/ HOD IS

Perform day-to-day operations of the Security Operations Center (SOC), including monitoring security alerts, incidents, and events Administer and maintain security monitoring tools, including Security Information and Event Management (SIEM), Endpoint Detection & Response (EDR) and other security technologies Conduct root cause analysis of security incidents and recommend containment and remediation measures Provide tiered support for security incidents and events, including incident triage, escalation, and resolution Monitor the health and performance of SOC infrastructure components Collaborate with cross-functional teams to respond and mitigate security incidents, including coordinating incident response activities and communicating with stakeholders Perform proactive threat hunting and security monitoring to identify and respond to potential security threats and vulnerabilities Develop and maintain custom parsers for log sources to ensure accurate data normalization and event correlation within the SIEM Onboard and validate log sources in the SIEM platform to ensure asset coverage and visibility Participate in security incident response exercises and tabletop simulations to test and improve incident response procedures Assist with SOC administration tasks, including user access management, tool configuration, fine tuning, and system maintenance/upgrades Develop & update use-cases, SOC policies, procedures, guidelines in alignment with industry standards and regulatory requirements Conduct post-incident analysis and implement improvements to prevent future incidents Assist in the configuration, tuning, patching, and maintenance of SIEM Any other related duty assigned by the Security Ops Lead/ HOD IS

Requirements

Bachelor's degree in technology/engineering/Information Security related field required Minimum 2 to 3 years of hands-on experience in SOC and information security in a large enterprise environment Strong understanding of SIEM, SOC operations and security monitoring principles Experience with SIEM administration, including asset integration, parsing, creating correlation rules, custom dashboards, and reports Proficiency in conducting security investigations and incident response activities Strong knowledge of security technologies such as IDS/IPS, firewalls, WAF, PAM, DLP, Endpoint Detection and Response (EDR), SOAR, and network security monitoring (NSM) Ability to analyze security event data and identify indicators of compromise (IOCs) and security anomalies Excellent communication and collaboration skills, with the ability to work effectively in a team environment Attention to detail and strong problem-solving skills

Benefits

Competitive salary Fuel Card Health benefits Professional development opportunities Inclusive work culture & much more Seniority level

Seniority level Mid-Senior level Employment type

Employment type Full-time Job function

Job function Information Technology Industries IT Services and IT Consulting Referrals increase your chances of interviewing at Pakistan Single Window (PSW) by 2x Sign in to set job alerts for “Security Operations Center Analyst” roles.

Karachi Division, Sindh, Pakistan 6 days ago Karachi Division, Sindh, Pakistan 1 month ago Karachi Division, Sindh, Pakistan 1 month ago Microsoft Sentinel Security Engineer (XDR / E5 Security Stack)

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

SOC Analyst Level 2

Lahore, Punjab Acemoneytransfer

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

Job Title: SOC Analyst Level 2

Department: Security Operations Center (SOC)

Reports To: SOC Manager / SOC Lead

Location: Lahore/Kharian, Punjab, Pakistan)

About Us:

ACE Money Transfer is a UK-based company headquartered in Manchester, United Kingdom. The company is an online remittance service provider for customers from the UK, Canada, Australia, and the European Union, including Switzerland. The company is a parent company in a group of companies with a diversified portfolio, including digital wallet services in the UK and real estate, advertising businesses, and software solutions in Pakistan.

Job Overview:

The SOC Analyst Level 2 plays a crucial role in the proactive monitoring, detection, analysis, and response to security incidents within the ACE IT infrastructure. With approximately 3 years of experience, this individual possesses a solid understanding of security principles, threats, and technologies. They are responsible for escalating complex security events, conducting in-depth investigations, and contributing to the improvement of security processes and tools. The ideal candidate is a highly motivated and detail-oriented individual with strong analytical and problem-solving skills, capable of working independently and as part of a team.

Responsibilities:

  • Security Monitoring and Analysis:
    • Continuously monitor security alerts and events from various security tools (SIEM, IDS/IPS, firewalls, endpoint security, etc.).
    • Analyze security logs and network traffic to identify potential security incidents and anomalies
    • Perform initial triage and analysis of security events to determine their validity, scope, and severity
    • Correlate security events from multiple sources to identify complex attack patterns
  • Incident Response:
    • Follow established incident response procedures to contain, eradicate, and recover from security incidents
    • Conduct initial and in-depth technical investigations of security incidents
    • Document all findings, actions taken, and communications related to security incidents
    • Escalate complex or high-severity incidents to SOC Level 3 analysts or other relevant teams as necessary
    • Assist in the development and refinement of incident response playbooks
  • Threat Intelligence:
    • Stay up-to-date on current security threats, vulnerabilities, and attack techniques
    • Utilize threat intelligence platforms and feeds to enhance detection and response capabilities
    • Contribute to the development of threat profiles and indicators of compromise (IOCs)
  • Security Tooling and Technologies:
    • Utilize and maintain various security tools and technologies, including SIEM, IDS/IPS, EDR, vulnerability scanners, and ticketing systems
    • Contribute to the configuration, tuning, and optimization of security monitoring tools
    • Troubleshoot issues related to security tools and escalate as needed
  • Reporting and Documentation:
    • Prepare clear and concise reports on security events, incidents, and trends
    • Maintain accurate and up-to-date documentation of security processes and procedures
  • Collaboration and Communication:
    • Effectively communicate security-related information to both technical and non-technical audiences
    • Collaborate with other security teams, IT departments, and business units on security matters
    • Participate in knowledge-sharing activities within the SOC team
  • Continuous Improvement:
    • Identify areas for improvement in security monitoring, detection, and response processes
    • Contribute to the development and implementation of new security rules and alerts
    • Participate in security training and professional development activities
Qualifications:

  • Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent practical experience).
  • Minimum of 3 years of experience working in a Security Operations Center (SOC) environment
  • Strong understanding of security principles, common attack vectors, and mitigation techniques
  • Experience with security monitoring tools and technologies (e.g., SIEM platforms like Splunk, Wazu; IDS/IPS systems; EDR solutions)
  • Experience with log analysis and correlation
  • Basic scripting skills (e.g., Python, PowerShell) are a plus
  • Ability to prioritize tasks and manage time effectively.
  • Relevant security certifications such as CompTIA Security+, CySA+, CEH, GCIH, or equivalent
  • Knowledge of cloud security concepts and platforms (e.g., AWS, Azure, GCP)
  • Experience with vulnerability management processes and tools
  • Familiarity with security frameworks and standards (e.g., NIST, ISO 27001)
  • Experience with security automation and orchestration (SOAR) platforms

How to Apply:

If you are a dedicated cybersecurity professional with a passion for protecting digital assets and a desire to work in a dynamic and collaborative environment, we encourage you to apply. Please submit your resume and a cover letter detailing your relevant experience to Money Transfer is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.

Powered by JazzHR

f3MTMMW8bN

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Internet Publishing

Referrals increase your chances of interviewing at ACE Money Transfer by 2x

Get notified about new Security Operations Center Analyst jobs in Lahore, Punjab, Pakistan .

Cybersecurity Business Development Representative Senior Security Operations Centre (SOC) Analyst Senior Security Operations Center (SOC) Analyst Pre-Sales Solution Specialist -Azure Security Practice

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Soc analyst Jobs in Pakistan !

SOC Analyst Level 2

Lahore, Punjab Acemoneytransfer

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

Job Title:

SOC Analyst Level 2

Department:

Security Operations Center (SOC)

Reports To:

SOC Manager / SOC Lead

Location:

Lahore/Kharian, Punjab, Pakistan)

About Us:

ACE Money Transfer is a UK-based company headquartered in Manchester, United Kingdom. The company is an online remittance service provider for customers from the UK, Canada, Australia, and the European Union, including Switzerland. The company is a parent company in a group of companies with a diversified portfolio, including digital wallet services in the UK and real estate, advertising businesses, and software solutions in Pakistan.

Job Overview:

The SOC Analyst Level 2 plays a crucial role in the proactive monitoring, detection, analysis, and response to security incidents within the ACE IT infrastructure. With approximately 3 years of experience, this individual possesses a solid understanding of security principles, threats, and technologies. They are responsible for escalating complex security events, conducting in-depth investigations, and contributing to the improvement of security processes and tools. The ideal candidate is a highly motivated and detail-oriented individual with strong analytical and problem-solving skills, capable of working independently and as part of a team.

Responsibilities:

Security Monitoring and Analysis: Continuously monitor security alerts and events from various security tools (SIEM, IDS/IPS, firewalls, endpoint security, etc.). Analyze security logs and network traffic to identify potential security incidents and anomalies Perform initial triage and analysis of security events to determine their validity, scope, and severity Correlate security events from multiple sources to identify complex attack patterns Incident Response: Follow established incident response procedures to contain, eradicate, and recover from security incidents Conduct initial and in-depth technical investigations of security incidents Document all findings, actions taken, and communications related to security incidents Escalate complex or high-severity incidents to SOC Level 3 analysts or other relevant teams as necessary Assist in the development and refinement of incident response playbooks Threat Intelligence: Stay up-to-date on current security threats, vulnerabilities, and attack techniques Utilize threat intelligence platforms and feeds to enhance detection and response capabilities Contribute to the development of threat profiles and indicators of compromise (IOCs) Security Tooling and Technologies: Utilize and maintain various security tools and technologies, including SIEM, IDS/IPS, EDR, vulnerability scanners, and ticketing systems Contribute to the configuration, tuning, and optimization of security monitoring tools Troubleshoot issues related to security tools and escalate as needed Reporting and Documentation: Prepare clear and concise reports on security events, incidents, and trends Maintain accurate and up-to-date documentation of security processes and procedures Collaboration and Communication: Effectively communicate security-related information to both technical and non-technical audiences Collaborate with other security teams, IT departments, and business units on security matters Participate in knowledge-sharing activities within the SOC team Continuous Improvement: Identify areas for improvement in security monitoring, detection, and response processes Contribute to the development and implementation of new security rules and alerts Participate in security training and professional development activities Qualifications:

Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent practical experience). Minimum of 3 years of experience working in a Security Operations Center (SOC) environment Strong understanding of security principles, common attack vectors, and mitigation techniques Experience with security monitoring tools and technologies (e.g., SIEM platforms like Splunk, Wazu; IDS/IPS systems; EDR solutions) Experience with log analysis and correlation Basic scripting skills (e.g., Python, PowerShell) are a plus Ability to prioritize tasks and manage time effectively. Relevant security certifications such as CompTIA Security+, CySA+, CEH, GCIH, or equivalent Knowledge of cloud security concepts and platforms (e.g., AWS, Azure, GCP) Experience with vulnerability management processes and tools Familiarity with security frameworks and standards (e.g., NIST, ISO 27001) Experience with security automation and orchestration (SOAR) platforms

How to Apply:

If you are a dedicated cybersecurity professional with a passion for protecting digital assets and a desire to work in a dynamic and collaborative environment, we encourage you to apply. Please submit your resume and a cover letter detailing your relevant experience to Money Transfer is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.

Powered by JazzHR

f3MTMMW8bN Seniority level

Seniority level Mid-Senior level Employment type

Employment type Full-time Job function

Job function Information Technology Industries Internet Publishing Referrals increase your chances of interviewing at ACE Money Transfer by 2x Get notified about new Security Operations Center Analyst jobs in

Lahore, Punjab, Pakistan . Cybersecurity Business Development Representative

Senior Security Operations Centre (SOC) Analyst

Senior Security Operations Center (SOC) Analyst

Pre-Sales Solution Specialist -Azure Security Practice

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

SOC Analyst – Levels 1 & 2

Sindh, Sindh Novasecuris

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

Novasecuris, a leading Cyber Security Agency, is currently seeking highly skilled and motivated individuals to join our Security Operations Center (SOC) team at Levels 1 and 2. Operating under the renowned SOC, Clycn AI, the SOC Analyst will play a crucial role in monitoring, analyzing, and responding to security events and incidents within our clients’ networks. We are looking for candidates with a strong understanding of cybersecurity principles, experience in SOC environments, and a passion for staying ahead of emerging threats.

Job Title:

SOC Analyst – Levels 1 & 2

Company:

Novasecuris – Cyber Security Agency

SOC Name:

Clycn AI

Position Type:

Full-time

Responsibilities:
  1. Monitor security event alerts generated by Clycn AI’s advanced security technologies, including SIEM, IDS/IPS, firewall logs, antivirus systems, etc.
  2. Conduct proactive threat hunting to identify potential security incidents or breaches.
  3. Analyze and investigate security alerts to determine the root cause, extent of impact, and appropriate response actions.
  4. Collaborate with other members of the Clycn AI SOC team and relevant stakeholders to coordinate incident response efforts.
  5. Provide timely and accurate reporting on security incidents, including incident summaries, root cause analysis, and remediation recommendations.
  6. Develop and maintain SOC documentation, including standard operating procedures (SOPs), incident response plans, and playbook.
  7. Stay current with emerging threats, vulnerabilities, and security technologies through continuous learning and training.
Requirements:
  1. Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field (preferred).
  2. Professional certifications such as CompTIA Security+, GIAC Certified Incident Handler (GCIH), or equivalent.
  3. Previous experience working in a SOC environment or similar role.
  4. Strong understanding of cybersecurity principles, best practices, and industry standards.
  5. Familiarity with security tools and technologies such as SIEM, IDS/IPS, firewall, antivirus, etc.
  6. Experience with incident response procedures, including detection, analysis, containment, eradication, and recovery.
  7. Excellent analytical and problem-solving skills, with the ability to analyze and interpret complex data sets.
  8. Effective communication skills, both verbal and written, with the ability to communicate technical information to non-technical stakeholders.
  9. Ability to work independently as well as part of a team, with a strong sense of ownership and accountability.
Preferred Qualifications:
  1. Experience with threat hunting and proactive threat detection techniques.
  2. Knowledge of scripting languages (e.g., Python, PowerShell) for task automation and analysis.
  3. Familiarity with cloud security concepts and technologies (e.g., AWS, Azure, GCP).
  4. Understanding of networking protocols and technologies.
  5. Experience with regulatory compliance requirements such as GDPR, HIPAA, PCI-DSS, etc.

Join our dynamic SOC team at Clycn AI and contribute to our mission of safeguarding our clients’ digital assets from cyber threats. If you are passionate about cybersecurity and thrive in a challenging environment, we want to hear from you!

Apply for this position

Full Name *

Email *

Phone Number *

Upload CV/Resume *

Message By using this form you agree with the storage and handling of your data by Novasecuris *.

  • By subscribing, I consent to the use of my personal information in accordance with Novasecuris' Privacy Policy. Novasecuris commits not to sell, trade, lease, or rent my personal data to any third parties.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

SOC Analyst – Levels 1 & 2

Karachi, Sindh Novasecuris

Posted 26 days ago

Job Viewed

Tap Again To Close

Job Description

Novasecuris, a leading Cyber Security Agency, is currently seeking highly skilled and motivated individuals to join our Security Operations Center (SOC) team at Levels 1 and 2. Operating under the renowned SOC, Clycn AI, the SOC Analyst will play a crucial role in monitoring, analyzing, and responding to security events and incidents within our clients’ networks. We are looking for candidates with a strong understanding of cybersecurity principles, experience in SOC environments, and a passion for staying ahead of emerging threats. Job Title:

SOC Analyst – Levels 1 & 2 Company:

Novasecuris – Cyber Security Agency SOC Name:

Clycn AI Position Type:

Full-time Responsibilities:

Monitor security event alerts generated by Clycn AI’s advanced security technologies, including SIEM, IDS/IPS, firewall logs, antivirus systems, etc. Conduct proactive threat hunting to identify potential security incidents or breaches. Analyze and investigate security alerts to determine the root cause, extent of impact, and appropriate response actions. Collaborate with other members of the Clycn AI SOC team and relevant stakeholders to coordinate incident response efforts. Provide timely and accurate reporting on security incidents, including incident summaries, root cause analysis, and remediation recommendations. Develop and maintain SOC documentation, including standard operating procedures (SOPs), incident response plans, and playbook. Stay current with emerging threats, vulnerabilities, and security technologies through continuous learning and training. Requirements:

Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field (preferred). Professional certifications such as CompTIA Security+, GIAC Certified Incident Handler (GCIH), or equivalent. Previous experience working in a SOC environment or similar role. Strong understanding of cybersecurity principles, best practices, and industry standards. Familiarity with security tools and technologies such as SIEM, IDS/IPS, firewall, antivirus, etc. Experience with incident response procedures, including detection, analysis, containment, eradication, and recovery. Excellent analytical and problem-solving skills, with the ability to analyze and interpret complex data sets. Effective communication skills, both verbal and written, with the ability to communicate technical information to non-technical stakeholders. Ability to work independently as well as part of a team, with a strong sense of ownership and accountability. Preferred Qualifications:

Experience with threat hunting and proactive threat detection techniques. Knowledge of scripting languages (e.g., Python, PowerShell) for task automation and analysis. Familiarity with cloud security concepts and technologies (e.g., AWS, Azure, GCP). Understanding of networking protocols and technologies. Experience with regulatory compliance requirements such as GDPR, HIPAA, PCI-DSS, etc. Join our dynamic SOC team at Clycn AI and contribute to our mission of safeguarding our clients’ digital assets from cyber threats. If you are passionate about cybersecurity and thrive in a challenging environment, we want to hear from you! Apply for this position

Full Name * Email * Phone Number * Upload CV/Resume * Message By using this form you agree with the storage and handling of your data by Novasecuris *. By subscribing, I consent to the use of my personal information in accordance with Novasecuris' Privacy Policy. Novasecuris commits not to sell, trade, lease, or rent my personal data to any third parties.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Soc Analyst Jobs