Find The RightJob.
Seeking a hands-on SOC Analyst to provide immediate operational support and free up internal security staff. This role focuses on real-time monitoring, triage, and response to security alerts across endpoint protection, phishing incidents, and email security tools. Primary responsibility includes working with: SentinelOne (EDR/XDR alerts) Microsoft Defender (Email, Endpoint, Identity alerts) Security Operations Center (SOC) Analyst Phishing reports from end-users
Key ResponsibilitiesCore Technical Skills Hands-on experience with: SentinelOne (EDR/XDR investigation) Microsoft Defender (Endpoint + Email Security) Strong understanding of: Phishing detection and analysis Malware behavior and indicators of compromise (IOCs) Email security (SPF, DKIM, DMARC basics) Familiarity with SIEM/SOAR tools (nice to have)
Preferred Skills Experience with: Microsoft Defender for Office 365 Threat Intelligence platforms Basic scripting (PowerShell/Python) for investigation Understanding of MITRE ATT&CK framework
Soft Skills Strong analytical thinking Clear communication (written & verbal) Ability to work in fast-paced SOC environment High attention to detail
Certifications (Preferred) Security+, CySA+ / CEH, Microsoft Security Operations Analyst (SC-200)
For applications and inquiries, contact: hirings@openkyber.com
Similar jobs
No similar jobs found
© 2026 Qureos. All rights reserved.