29 Soc Analyst jobs in Pakistan
SOC Analyst
Posted 14 days ago
Job Viewed
Job Description
Position Title: Security Analyst (SOC Analyst)
Job Type: Full-time
The Security Analyst I role is a critical position within the organization. The primary function of the role will be to provide monitoring of deployed customer environments for security events. This includes establishing the extent of a threat, the business impact, and advising the most suitable course of action to contain and remedy the event. A Cybersecurity Technician will serve as an escalation point to the subject matter expert for in-depth cybersecurity events and must be able to communicate effectively to all stakeholders during the event management process.
Key Responsibilities
- Manage the security event monitoring and incident response ticket queues and triage as appropriate to meet the established service level agreements
- Promptly transfer cybersecurity tickets to the client or internal point of contact
- Clearly convey indicators of compromise, isolation, and remediation steps
- Analyze and interpret system, security, and application logs in order to diagnose faults, spot abnormal behavior, and rule out false positives
- Effectively utilize End Detection and Response tools to investigate alerts, anomalies, and build accurate timelines related to possible compromise
- Follow established procedures to investigate, escalate, contain, or eradicate malicious activity
- Develop and deliver written and oral reports to clients, teammates, and management to aggregate and communicate security information and metrics
- Provide input and recommendations to improve internal processes and procedures related to SOC duties and responsibilities
- Participate in threat-hunting activities and other special projects as required
- Understand and follow, our set of standards and processes that produce a predictable result for the client. You must be aware of and maintain our standards.
Additional Responsibilities
- Maintain accurate and real-time timesheets, record complete and accurate notes of troubleshooting and communication with clients
- Receive mentoring and feedback from peers and others
- Where appropriate, escalate complicated issues to a more senior resource or other appropriate teams
- Review Tickets with Manager
- Actively Participate in Team Huddles, L10 Meetings, One on One Meetings, and any other Team Meetings
- Create and update documentation when changes occur, or when discoveries are made
- Attend monthly training & team meetings as required
- Additional duties as required
Skills, Knowledge, and Expertise
- Two years work experience in the Information Security or related fields
- Two or more current security-related industry certifications
- Experience with SIEM platforms, firewall management, and endpoint detection and response platforms
- One year or more of experience with EDR solutions, ESGs, vulnerability management, and content filtering
- Good problem-solving and decision-making skills; ability to understand and analyze complex issues
- Self-motivated, detail-oriented, highly organized, and able to handle a variety of tasks and responsibilities in an efficient manner with a high level of quality
- One of the following certifications preferred: CompTIA Security+, CompTIA CySA+, CCNA, C|EH, SSCP, or equivalent
SOC Analyst
Posted 17 days ago
Job Viewed
Job Description
Security Analyst (SOC Analyst) Job Type: Full-time The Security Analyst I role is a critical position within the organization. The primary function of the role will be to provide monitoring of deployed customer environments for security events. This includes establishing the extent of a threat, the business impact, and advising the most suitable course of action to contain and remedy the event. A Cybersecurity Technician will serve as an escalation point to the subject matter expert for in-depth cybersecurity events and must be able to communicate effectively to all stakeholders during the event management process. Key Responsibilities Manage the security event monitoring and incident response ticket queues and triage as appropriate to meet the established service level agreements Promptly transfer cybersecurity tickets to the client or internal point of contact Clearly convey indicators of compromise, isolation, and remediation steps Analyze and interpret system, security, and application logs in order to diagnose faults, spot abnormal behavior, and rule out false positives Effectively utilize End Detection and Response tools to investigate alerts, anomalies, and build accurate timelines related to possible compromise Follow established procedures to investigate, escalate, contain, or eradicate malicious activity Develop and deliver written and oral reports to clients, teammates, and management to aggregate and communicate security information and metrics Provide input and recommendations to improve internal processes and procedures related to SOC duties and responsibilities Participate in threat-hunting activities and other special projects as required Understand and follow, our set of standards and processes that produce a predictable result for the client. You must be aware of and maintain our standards. Additional Responsibilities Maintain accurate and real-time timesheets, record complete and accurate notes of troubleshooting and communication with clients Receive mentoring and feedback from peers and others Where appropriate, escalate complicated issues to a more senior resource or other appropriate teams Review Tickets with Manager Actively Participate in Team Huddles, L10 Meetings, One on One Meetings, and any other Team Meetings Create and update documentation when changes occur, or when discoveries are made Attend monthly training & team meetings as required Additional duties as required Skills, Knowledge, and Expertise Two years work experience in the Information Security or related fields Two or more current security-related industry certifications Experience with SIEM platforms, firewall management, and endpoint detection and response platforms One year or more of experience with EDR solutions, ESGs, vulnerability management, and content filtering Good problem-solving and decision-making skills; ability to understand and analyze complex issues Self-motivated, detail-oriented, highly organized, and able to handle a variety of tasks and responsibilities in an efficient manner with a high level of quality One of the following certifications preferred: CompTIA Security+, CompTIA CySA+, CCNA, C|EH, SSCP, or equivalent
#J-18808-Ljbffr
Sr. SOC Analyst
Posted 14 days ago
Job Viewed
Job Description
Get AI-powered advice on this job and more exclusive features.
- Perform day-to-day operations of the Security Operations Center (SOC), including monitoring security alerts, incidents, and events
- Administer and maintain security monitoring tools, including Security Information and Event Management (SIEM), Endpoint Detection & Response (EDR) and other security technologies
- Conduct root cause analysis of security incidents and recommend containment and remediation measures
- Provide tiered support for security incidents and events, including incident triage, escalation, and resolution
- Monitor the health and performance of SOC infrastructure components
- Collaborate with cross-functional teams to respond and mitigate security incidents, including coordinating incident response activities and communicating with stakeholders
- Perform proactive threat hunting and security monitoring to identify and respond to potential security threats and vulnerabilities
- Develop and maintain custom parsers for log sources to ensure accurate data normalization and event correlation within the SIEM
- Onboard and validate log sources in the SIEM platform to ensure asset coverage and visibility
- Participate in security incident response exercises and tabletop simulations to test and improve incident response procedures
- Assist with SOC administration tasks, including user access management, tool configuration, fine tuning, and system maintenance/upgrades
- Develop & update use-cases, SOC policies, procedures, guidelines in alignment with industry standards and regulatory requirements
- Conduct post-incident analysis and implement improvements to prevent future incidents
- Assist in the configuration, tuning, patching, and maintenance of SIEM
- Any other related duty assigned by the Security Ops Lead/ HOD IS
- Perform day-to-day operations of the Security Operations Center (SOC), including monitoring security alerts, incidents, and events
- Administer and maintain security monitoring tools, including Security Information and Event Management (SIEM), Endpoint Detection & Response (EDR) and other security technologies
- Conduct root cause analysis of security incidents and recommend containment and remediation measures
- Provide tiered support for security incidents and events, including incident triage, escalation, and resolution
- Monitor the health and performance of SOC infrastructure components
- Collaborate with cross-functional teams to respond and mitigate security incidents, including coordinating incident response activities and communicating with stakeholders
- Perform proactive threat hunting and security monitoring to identify and respond to potential security threats and vulnerabilities
- Develop and maintain custom parsers for log sources to ensure accurate data normalization and event correlation within the SIEM
- Onboard and validate log sources in the SIEM platform to ensure asset coverage and visibility
- Participate in security incident response exercises and tabletop simulations to test and improve incident response procedures
- Assist with SOC administration tasks, including user access management, tool configuration, fine tuning, and system maintenance/upgrades
- Develop & update use-cases, SOC policies, procedures, guidelines in alignment with industry standards and regulatory requirements
- Conduct post-incident analysis and implement improvements to prevent future incidents
- Assist in the configuration, tuning, patching, and maintenance of SIEM
- Any other related duty assigned by the Security Ops Lead/ HOD IS
- Bachelor's degree in technology/engineering/Information Security related field required
- Minimum 2 to 3 years of hands-on experience in SOC and information security in a large enterprise environment
- Strong understanding of SIEM, SOC operations and security monitoring principles
- Experience with SIEM administration, including asset integration, parsing, creating correlation rules, custom dashboards, and reports
- Proficiency in conducting security investigations and incident response activities
- Strong knowledge of security technologies such as IDS/IPS, firewalls, WAF, PAM, DLP, Endpoint Detection and Response (EDR), SOAR, and network security monitoring (NSM)
- Ability to analyze security event data and identify indicators of compromise (IOCs) and security anomalies
- Excellent communication and collaboration skills, with the ability to work effectively in a team environment
- Attention to detail and strong problem-solving skills
- Competitive salary
- Fuel Card
- Health benefits
- Professional development opportunities
- Inclusive work culture & much more
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries IT Services and IT Consulting
Referrals increase your chances of interviewing at Pakistan Single Window (PSW) by 2x
Sign in to set job alerts for “Security Operations Center Analyst” roles.Karachi Division, Sindh, Pakistan 6 days ago
Karachi Division, Sindh, Pakistan 1 month ago
Karachi Division, Sindh, Pakistan 1 month ago
Microsoft Sentinel Security Engineer (XDR / E5 Security Stack)We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrSr. SOC Analyst
Posted 14 days ago
Job Viewed
Job Description
- Perform day-to-day operations of the Security Operations Center (SOC), including monitoring security alerts, incidents, and events.
- Administer and maintain security monitoring tools, including Security Information and Event Management (SIEM), Endpoint Detection & Response (EDR) and other security technologies.
- Conduct root cause analysis of security incidents and recommend containment and remediation measures.
- Provide tiered support for security incidents and events, including incident triage, escalation, and resolution.
- Monitor the health and performance of SOC infrastructure components.
- Collaborate with cross-functional teams to respond and mitigate security incidents, including coordinating incident response activities and communicating with stakeholders.
- Perform proactive threat hunting and security monitoring to identify and respond to potential security threats and vulnerabilities.
- Develop and maintain custom parsers for log sources to ensure accurate data normalization and event correlation within the SIEM.
- Onboard and validate log sources in the SIEM platform to ensure asset coverage and visibility.
- Participate in security incident response exercises and tabletop simulations to test and improve incident response procedures.
- Assist with SOC administration tasks, including user access management, tool configuration, fine tuning, and system maintenance/upgrades.
- Develop & update use-cases, SOC policies, procedures, guidelines in alignment with industry standards and regulatory requirements.
- Conduct post-incident analysis and implement improvements to prevent future incidents.
- Assist in the configuration, tuning, patching, and maintenance of SIEM.
- Any other related duty assigned by the Security Ops Lead/ HOD IS.
- Bachelor’s degree in technology/engineering/Information Security related field required.
- Minimum 2 to 3 years of hands-on experience in SOC and information security in a large enterprise environment.
- Strong understanding of SIEM, SOC operations and security monitoring principles.
- Experience with SIEM administration, including asset integration, parsing, creating correlation rules, custom dashboards, and reports.
- Proficiency in conducting security investigations and incident response activities.
- Strong knowledge of security technologies such as IDS/IPS, firewalls, WAF, PAM, DLP, Endpoint Detection and Response (EDR), SOAR, and network security monitoring (NSM).
- Ability to analyze security event data and identify indicators of compromise (IOCs) and security anomalies.
- Excellent communication and collaboration skills, with the ability to work effectively in a team environment.
- Attention to detail and strong problem-solving skills.
- Competitive salary
- Fuel Card
- Health benefits
- Professional development opportunities
- Inclusive work culture & much more
Sr. SOC Analyst
Posted 14 days ago
Job Viewed
Job Description
#J-18808-Ljbffr
Sr. SOC Analyst
Posted 14 days ago
Job Viewed
Job Description
Perform day-to-day operations of the Security Operations Center (SOC), including monitoring security alerts, incidents, and events Administer and maintain security monitoring tools, including Security Information and Event Management (SIEM), Endpoint Detection & Response (EDR) and other security technologies Conduct root cause analysis of security incidents and recommend containment and remediation measures Provide tiered support for security incidents and events, including incident triage, escalation, and resolution Monitor the health and performance of SOC infrastructure components Collaborate with cross-functional teams to respond and mitigate security incidents, including coordinating incident response activities and communicating with stakeholders Perform proactive threat hunting and security monitoring to identify and respond to potential security threats and vulnerabilities Develop and maintain custom parsers for log sources to ensure accurate data normalization and event correlation within the SIEM Onboard and validate log sources in the SIEM platform to ensure asset coverage and visibility Participate in security incident response exercises and tabletop simulations to test and improve incident response procedures Assist with SOC administration tasks, including user access management, tool configuration, fine tuning, and system maintenance/upgrades Develop & update use-cases, SOC policies, procedures, guidelines in alignment with industry standards and regulatory requirements Conduct post-incident analysis and implement improvements to prevent future incidents Assist in the configuration, tuning, patching, and maintenance of SIEM Any other related duty assigned by the Security Ops Lead/ HOD IS
Requirements
Bachelor's degree in technology/engineering/Information Security related field required Minimum 2 to 3 years of hands-on experience in SOC and information security in a large enterprise environment Strong understanding of SIEM, SOC operations and security monitoring principles Experience with SIEM administration, including asset integration, parsing, creating correlation rules, custom dashboards, and reports Proficiency in conducting security investigations and incident response activities Strong knowledge of security technologies such as IDS/IPS, firewalls, WAF, PAM, DLP, Endpoint Detection and Response (EDR), SOAR, and network security monitoring (NSM) Ability to analyze security event data and identify indicators of compromise (IOCs) and security anomalies Excellent communication and collaboration skills, with the ability to work effectively in a team environment Attention to detail and strong problem-solving skills
Benefits
Competitive salary Fuel Card Health benefits Professional development opportunities Inclusive work culture & much more Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries IT Services and IT Consulting Referrals increase your chances of interviewing at Pakistan Single Window (PSW) by 2x Sign in to set job alerts for “Security Operations Center Analyst” roles.
Karachi Division, Sindh, Pakistan 6 days ago Karachi Division, Sindh, Pakistan 1 month ago Karachi Division, Sindh, Pakistan 1 month ago Microsoft Sentinel Security Engineer (XDR / E5 Security Stack)
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
SOC Analyst Level 2
Posted 14 days ago
Job Viewed
Job Description
Job Title: SOC Analyst Level 2
Department: Security Operations Center (SOC)
Reports To: SOC Manager / SOC Lead
Location: Lahore/Kharian, Punjab, Pakistan)
About Us:
ACE Money Transfer is a UK-based company headquartered in Manchester, United Kingdom. The company is an online remittance service provider for customers from the UK, Canada, Australia, and the European Union, including Switzerland. The company is a parent company in a group of companies with a diversified portfolio, including digital wallet services in the UK and real estate, advertising businesses, and software solutions in Pakistan.
Job Overview:
The SOC Analyst Level 2 plays a crucial role in the proactive monitoring, detection, analysis, and response to security incidents within the ACE IT infrastructure. With approximately 3 years of experience, this individual possesses a solid understanding of security principles, threats, and technologies. They are responsible for escalating complex security events, conducting in-depth investigations, and contributing to the improvement of security processes and tools. The ideal candidate is a highly motivated and detail-oriented individual with strong analytical and problem-solving skills, capable of working independently and as part of a team.
Responsibilities:
- Security Monitoring and Analysis:
- Continuously monitor security alerts and events from various security tools (SIEM, IDS/IPS, firewalls, endpoint security, etc.).
- Analyze security logs and network traffic to identify potential security incidents and anomalies
- Perform initial triage and analysis of security events to determine their validity, scope, and severity
- Correlate security events from multiple sources to identify complex attack patterns
- Incident Response:
- Follow established incident response procedures to contain, eradicate, and recover from security incidents
- Conduct initial and in-depth technical investigations of security incidents
- Document all findings, actions taken, and communications related to security incidents
- Escalate complex or high-severity incidents to SOC Level 3 analysts or other relevant teams as necessary
- Assist in the development and refinement of incident response playbooks
- Threat Intelligence:
- Stay up-to-date on current security threats, vulnerabilities, and attack techniques
- Utilize threat intelligence platforms and feeds to enhance detection and response capabilities
- Contribute to the development of threat profiles and indicators of compromise (IOCs)
- Security Tooling and Technologies:
- Utilize and maintain various security tools and technologies, including SIEM, IDS/IPS, EDR, vulnerability scanners, and ticketing systems
- Contribute to the configuration, tuning, and optimization of security monitoring tools
- Troubleshoot issues related to security tools and escalate as needed
- Reporting and Documentation:
- Prepare clear and concise reports on security events, incidents, and trends
- Maintain accurate and up-to-date documentation of security processes and procedures
- Collaboration and Communication:
- Effectively communicate security-related information to both technical and non-technical audiences
- Collaborate with other security teams, IT departments, and business units on security matters
- Participate in knowledge-sharing activities within the SOC team
- Continuous Improvement:
- Identify areas for improvement in security monitoring, detection, and response processes
- Contribute to the development and implementation of new security rules and alerts
- Participate in security training and professional development activities
- Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent practical experience).
- Minimum of 3 years of experience working in a Security Operations Center (SOC) environment
- Strong understanding of security principles, common attack vectors, and mitigation techniques
- Experience with security monitoring tools and technologies (e.g., SIEM platforms like Splunk, Wazu; IDS/IPS systems; EDR solutions)
- Experience with log analysis and correlation
- Basic scripting skills (e.g., Python, PowerShell) are a plus
- Ability to prioritize tasks and manage time effectively.
- Relevant security certifications such as CompTIA Security+, CySA+, CEH, GCIH, or equivalent
- Knowledge of cloud security concepts and platforms (e.g., AWS, Azure, GCP)
- Experience with vulnerability management processes and tools
- Familiarity with security frameworks and standards (e.g., NIST, ISO 27001)
- Experience with security automation and orchestration (SOAR) platforms
If you are a dedicated cybersecurity professional with a passion for protecting digital assets and a desire to work in a dynamic and collaborative environment, we encourage you to apply. Please submit your resume and a cover letter detailing your relevant experience to Money Transfer is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.
Powered by JazzHR
f3MTMMW8bN Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Internet Publishing
Referrals increase your chances of interviewing at ACE Money Transfer by 2x
Get notified about new Security Operations Center Analyst jobs in Lahore, Punjab, Pakistan .
Cybersecurity Business Development Representative Senior Security Operations Centre (SOC) Analyst Senior Security Operations Center (SOC) Analyst Pre-Sales Solution Specialist -Azure Security PracticeWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrBe The First To Know
About the latest Soc analyst Jobs in Pakistan !
SOC Analyst Level 2
Posted 14 days ago
Job Viewed
Job Description
SOC Analyst Level 2
Department:
Security Operations Center (SOC)
Reports To:
SOC Manager / SOC Lead
Location:
Lahore/Kharian, Punjab, Pakistan)
About Us:
ACE Money Transfer is a UK-based company headquartered in Manchester, United Kingdom. The company is an online remittance service provider for customers from the UK, Canada, Australia, and the European Union, including Switzerland. The company is a parent company in a group of companies with a diversified portfolio, including digital wallet services in the UK and real estate, advertising businesses, and software solutions in Pakistan.
Job Overview:
The SOC Analyst Level 2 plays a crucial role in the proactive monitoring, detection, analysis, and response to security incidents within the ACE IT infrastructure. With approximately 3 years of experience, this individual possesses a solid understanding of security principles, threats, and technologies. They are responsible for escalating complex security events, conducting in-depth investigations, and contributing to the improvement of security processes and tools. The ideal candidate is a highly motivated and detail-oriented individual with strong analytical and problem-solving skills, capable of working independently and as part of a team.
Responsibilities:
Security Monitoring and Analysis: Continuously monitor security alerts and events from various security tools (SIEM, IDS/IPS, firewalls, endpoint security, etc.). Analyze security logs and network traffic to identify potential security incidents and anomalies Perform initial triage and analysis of security events to determine their validity, scope, and severity Correlate security events from multiple sources to identify complex attack patterns Incident Response: Follow established incident response procedures to contain, eradicate, and recover from security incidents Conduct initial and in-depth technical investigations of security incidents Document all findings, actions taken, and communications related to security incidents Escalate complex or high-severity incidents to SOC Level 3 analysts or other relevant teams as necessary Assist in the development and refinement of incident response playbooks Threat Intelligence: Stay up-to-date on current security threats, vulnerabilities, and attack techniques Utilize threat intelligence platforms and feeds to enhance detection and response capabilities Contribute to the development of threat profiles and indicators of compromise (IOCs) Security Tooling and Technologies: Utilize and maintain various security tools and technologies, including SIEM, IDS/IPS, EDR, vulnerability scanners, and ticketing systems Contribute to the configuration, tuning, and optimization of security monitoring tools Troubleshoot issues related to security tools and escalate as needed Reporting and Documentation: Prepare clear and concise reports on security events, incidents, and trends Maintain accurate and up-to-date documentation of security processes and procedures Collaboration and Communication: Effectively communicate security-related information to both technical and non-technical audiences Collaborate with other security teams, IT departments, and business units on security matters Participate in knowledge-sharing activities within the SOC team Continuous Improvement: Identify areas for improvement in security monitoring, detection, and response processes Contribute to the development and implementation of new security rules and alerts Participate in security training and professional development activities Qualifications:
Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent practical experience). Minimum of 3 years of experience working in a Security Operations Center (SOC) environment Strong understanding of security principles, common attack vectors, and mitigation techniques Experience with security monitoring tools and technologies (e.g., SIEM platforms like Splunk, Wazu; IDS/IPS systems; EDR solutions) Experience with log analysis and correlation Basic scripting skills (e.g., Python, PowerShell) are a plus Ability to prioritize tasks and manage time effectively. Relevant security certifications such as CompTIA Security+, CySA+, CEH, GCIH, or equivalent Knowledge of cloud security concepts and platforms (e.g., AWS, Azure, GCP) Experience with vulnerability management processes and tools Familiarity with security frameworks and standards (e.g., NIST, ISO 27001) Experience with security automation and orchestration (SOAR) platforms
How to Apply:
If you are a dedicated cybersecurity professional with a passion for protecting digital assets and a desire to work in a dynamic and collaborative environment, we encourage you to apply. Please submit your resume and a cover letter detailing your relevant experience to Money Transfer is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.
Powered by JazzHR
f3MTMMW8bN Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Internet Publishing Referrals increase your chances of interviewing at ACE Money Transfer by 2x Get notified about new Security Operations Center Analyst jobs in
Lahore, Punjab, Pakistan . Cybersecurity Business Development Representative
Senior Security Operations Centre (SOC) Analyst
Senior Security Operations Center (SOC) Analyst
Pre-Sales Solution Specialist -Azure Security Practice
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
SOC Analyst – Levels 1 & 2
Posted 14 days ago
Job Viewed
Job Description
Novasecuris, a leading Cyber Security Agency, is currently seeking highly skilled and motivated individuals to join our Security Operations Center (SOC) team at Levels 1 and 2. Operating under the renowned SOC, Clycn AI, the SOC Analyst will play a crucial role in monitoring, analyzing, and responding to security events and incidents within our clients’ networks. We are looking for candidates with a strong understanding of cybersecurity principles, experience in SOC environments, and a passion for staying ahead of emerging threats.
Job Title:SOC Analyst – Levels 1 & 2
Company:Novasecuris – Cyber Security Agency
SOC Name:Clycn AI
Position Type:Full-time
Responsibilities:- Monitor security event alerts generated by Clycn AI’s advanced security technologies, including SIEM, IDS/IPS, firewall logs, antivirus systems, etc.
- Conduct proactive threat hunting to identify potential security incidents or breaches.
- Analyze and investigate security alerts to determine the root cause, extent of impact, and appropriate response actions.
- Collaborate with other members of the Clycn AI SOC team and relevant stakeholders to coordinate incident response efforts.
- Provide timely and accurate reporting on security incidents, including incident summaries, root cause analysis, and remediation recommendations.
- Develop and maintain SOC documentation, including standard operating procedures (SOPs), incident response plans, and playbook.
- Stay current with emerging threats, vulnerabilities, and security technologies through continuous learning and training.
- Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field (preferred).
- Professional certifications such as CompTIA Security+, GIAC Certified Incident Handler (GCIH), or equivalent.
- Previous experience working in a SOC environment or similar role.
- Strong understanding of cybersecurity principles, best practices, and industry standards.
- Familiarity with security tools and technologies such as SIEM, IDS/IPS, firewall, antivirus, etc.
- Experience with incident response procedures, including detection, analysis, containment, eradication, and recovery.
- Excellent analytical and problem-solving skills, with the ability to analyze and interpret complex data sets.
- Effective communication skills, both verbal and written, with the ability to communicate technical information to non-technical stakeholders.
- Ability to work independently as well as part of a team, with a strong sense of ownership and accountability.
- Experience with threat hunting and proactive threat detection techniques.
- Knowledge of scripting languages (e.g., Python, PowerShell) for task automation and analysis.
- Familiarity with cloud security concepts and technologies (e.g., AWS, Azure, GCP).
- Understanding of networking protocols and technologies.
- Experience with regulatory compliance requirements such as GDPR, HIPAA, PCI-DSS, etc.
Join our dynamic SOC team at Clycn AI and contribute to our mission of safeguarding our clients’ digital assets from cyber threats. If you are passionate about cybersecurity and thrive in a challenging environment, we want to hear from you!
Apply for this positionFull Name *
Email *
Phone Number *
Upload CV/Resume *
Message By using this form you agree with the storage and handling of your data by Novasecuris *.
- By subscribing, I consent to the use of my personal information in accordance with Novasecuris' Privacy Policy. Novasecuris commits not to sell, trade, lease, or rent my personal data to any third parties.
SOC Analyst – Levels 1 & 2
Posted 26 days ago
Job Viewed
Job Description
SOC Analyst – Levels 1 & 2 Company:
Novasecuris – Cyber Security Agency SOC Name:
Clycn AI Position Type:
Full-time Responsibilities:
Monitor security event alerts generated by Clycn AI’s advanced security technologies, including SIEM, IDS/IPS, firewall logs, antivirus systems, etc. Conduct proactive threat hunting to identify potential security incidents or breaches. Analyze and investigate security alerts to determine the root cause, extent of impact, and appropriate response actions. Collaborate with other members of the Clycn AI SOC team and relevant stakeholders to coordinate incident response efforts. Provide timely and accurate reporting on security incidents, including incident summaries, root cause analysis, and remediation recommendations. Develop and maintain SOC documentation, including standard operating procedures (SOPs), incident response plans, and playbook. Stay current with emerging threats, vulnerabilities, and security technologies through continuous learning and training. Requirements:
Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field (preferred). Professional certifications such as CompTIA Security+, GIAC Certified Incident Handler (GCIH), or equivalent. Previous experience working in a SOC environment or similar role. Strong understanding of cybersecurity principles, best practices, and industry standards. Familiarity with security tools and technologies such as SIEM, IDS/IPS, firewall, antivirus, etc. Experience with incident response procedures, including detection, analysis, containment, eradication, and recovery. Excellent analytical and problem-solving skills, with the ability to analyze and interpret complex data sets. Effective communication skills, both verbal and written, with the ability to communicate technical information to non-technical stakeholders. Ability to work independently as well as part of a team, with a strong sense of ownership and accountability. Preferred Qualifications:
Experience with threat hunting and proactive threat detection techniques. Knowledge of scripting languages (e.g., Python, PowerShell) for task automation and analysis. Familiarity with cloud security concepts and technologies (e.g., AWS, Azure, GCP). Understanding of networking protocols and technologies. Experience with regulatory compliance requirements such as GDPR, HIPAA, PCI-DSS, etc. Join our dynamic SOC team at Clycn AI and contribute to our mission of safeguarding our clients’ digital assets from cyber threats. If you are passionate about cybersecurity and thrive in a challenging environment, we want to hear from you! Apply for this position
Full Name * Email * Phone Number * Upload CV/Resume * Message By using this form you agree with the storage and handling of your data by Novasecuris *. By subscribing, I consent to the use of my personal information in accordance with Novasecuris' Privacy Policy. Novasecuris commits not to sell, trade, lease, or rent my personal data to any third parties.
#J-18808-Ljbffr