Job Description

Job Description:* Respond to and investigate system, service, or network attacks using forensic and incident response techniques.* Work directly with Security Engineers to develop proactive defenses, automation, and enhanced detection use cases within SIEM/SOC platforms.* Monitor security event logs to identify suspicious activity and potential security incidents.* Understand SOC processes and procedures and apply them appropriately based on client environments.* Escalate advanced or complex threats to L3 Senior Analysts when necessary.* Support digital forensics, threat investigations, and incident analysis.* Collaborate with IT and security teams to contain, mitigate, and resolve security incidents.* Perform proactive threat hunting and support vulnerability identification efforts.* Maintain and update SOC dashboards, reports, and documentation.* Participate in internal security awareness initiatives and operational documentation.* Work in a 24/7 SOC environment, following rotating 8-hour shifts across 3 daily cycles with a team of six analysts. Requirements:* Bachelor’s degree in Computer Science, Information Systems, or a related field.* 2–5 years of professional experience in cybersecurity or IT security.* Strong knowledge of SIEM/SOC platforms such as FortiSIEM, Splunk, QRadar, AlienVault USM Anywhere, or similar.* Strong analytical, investigative, and troubleshooting skills.* Excellent command of English (written and spoken).

Job Application Tips

  • Tailor your resume to highlight relevant experience for this position
  • Write a compelling cover letter that addresses the specific requirements
  • Research the company culture and values before applying
  • Prepare examples of your work that demonstrate your skills
  • Follow up on your application after a reasonable time period

You May Also Be Interested In