The SOC Analyst’s main objectives are to contribute to the key SOC operational tasks: content delivery, detection, monitoring and response. The role involves incident detection and response, monitoring and reporting, and coordination and planning within the Security Operations team.
Requirements
- 4 years prior experience in a Computer Emergency Response Team (CERT/CIRT), IT security environment, or law enforcement.
- Preferred certifications: GCIH, GCIA, GCFE, GCFA, GREM, OSCP, or equivalent experience.
- Proficient knowledge of SIEM & SOAR platforms, Log management, IDS/IPS, endpoint security solutions.
- Familiarity with network infrastructure, cloud environments, operating systems (Windows/Linux), applications, and protocols.
- Experience with building and maturing a Security Operations Center is a plus.
- Administrative experience with ServiceNOW, particularly with the ServiceNOW Security Operations module, is a plus.
- Excellent communication skills, both verbal and written, to effectively convey technical concepts to business stakeholders and produce clear incident reports.
- Strong analytical skills for in-depth investigation and problem-solving.
- Fluency in English, both spoken and in writing (minimum B2)