Job description

Posted on:
June 13, 2025
The SOC Analyst’s main objectives are to contribute following a multidisciplinary approach to the key SOC operational tasks: content delivery, detection, monitoring and response. This involves (analytical) activities to enable intelligence gathering and usage, improving detection capabilities and ability to perform in the triage processes (detect and response).
Requirements
- 4 years prior experience in a Computer Emergency Response Team (CERT/CIRT), IT security environment, or law enforcement
- Preferred certifications: GCIH, GCIA, GCFE, GCFA, GREM, OSCP, or equivalent experience
- Proficient knowledge of SIEM & SOAR platforms, Log management, IDS/IPS, endpoint security solutions
- Familiarity with network infrastructure, cloud environments, operating systems (Windows/Linux), applications, and protocols
- Experience with building and maturing a Security Operations Center is a plus
- Administrative experience with ServiceNOW, particularly with the ServiceNOW Security Operations module, is a plus
Requirements Summary
4 years of experience in a CERT/CIRT, IT security environment, or law enforcement, or equivalent experience. Preferred certifications: GCIH, GCIA, GCFE, GCFA, GREM, OSCP, or equivalent experience. Proficient knowledge of SIEM & SOAR platforms, Log management, IDS/IPS, endpoint security solutions