وصف الوظيفة


Job Summary

The SOC Analyst L1 is responsible for monitoring, responding, analyzing, and remediating cybersecurity alerts. As a SOC Analyst L1, your primary duty is to ensure that the organization’s digital assets are secure and protected from unauthorized access. You must protect both the online and on-premises infrastructures, monitor metrics and data to identify suspicious activity and identify and mitigate risks before adversaries breach your system. Some adversaries will still breach your system, and a SOC analyst fights the frontline battle.

Key Responsibilities

  • Responsible for working in a 24x7 Security Operation Center (SOC) environment.
  • Providing first-level response for security incidents.
  • Monitor and investigate security alerts and incidents using SIEM, EDR.
  • Rapidly identify, categorize, prioritize, and Triage Incidents
  • Perform initial investigation and triage of potential incidents and escalate or close Incidents as applicable.
  • Monitor and investigate web attacks, phishing emails, malwares, and so on.
  • Consolidate data from alert triage to provide the context necessary to initiate Tier II Analyst.
  • Escalate validated and confirmed incidents to the designated incident response team.
  • Maintain SOC shift logs with relevant activity from analyst shift.
  • Coordinate with SIEM Engineers to tune Events and Alerts.
  • Document investigation results, ensuring relevant details are passed to the secondary analysts for final event analysis.
  • Capable of operating independently to investigate and escalate alerts in line with operational requirements and SLAs.

Qualifications And Requirements

  • 0-1 years of experience in cybersecurity or a related field.
  • Basic technical knowledge of TCP/IP and networking.
  • Basic knowledge of SIEM technologies (QRadar, Splunk, Sentinel, etc.).
  • Basic knowledge of security technologies (Firewalls, IDS/IPS, WAF, EDR, Sandbox, Mail gateway).
  • Basic knowledge of threat intelligence, threat hunting, and malware analysis.
  • Basic knowledge of incident response.
  • Basic knowledge of cyber-attacks.
  • Web application attacks (OWASP top 10)
  • Core understanding of Cyber Kill Chain, MITRE ATT&CK Framework.
  • Good reporting skills.
  • Administrative skills in operating systems such as Windows and Linux.

Education

  • Bachelors in cyber security, Computer Science, Communication Engineering.