Job Title: SOC Analyst – IT Infrastructure & Network Security
We are seeking a highly motivated SOC Analyst with 1–3 years of hands-on experience in Security Operations Center (SOC) functions, IT infrastructure security, and network security. The ideal candidate will have strong experience with SIEM platforms, security event analysis, threat detection, and incident response. This role requires close collaboration with IT and Information Security teams to protect the organization’s critical assets.
Key Responsibilities
1. SIEM Implementation & Continuous Monitoring
- Assist in the implementation, configuration, tuning, and optimization of SIEM solutions to improve security event collection, correlation, and visibility.
- Continuously monitor SIEM dashboards and alerts to identify suspicious activities and potential threats.
2. IT Infrastructure & Network Security
- Support security initiatives across server infrastructure, applications, and network environments.
- Collaborate with IT teams to assess and strengthen security controls across Data Centers, Cloud (Azure), O365, and On-Premises environments.
3. Security Logging & Monitoring
- Develop a strong understanding of logging mechanisms, log sources, and monitoring techniques.
- Ensure accurate log collection, normalization, and retention across all supported environments for effective threat detection and forensic analysis.
4. Security Tools Management
- Assist in the administration and maintenance of security tools, including:
- SIEM platforms
- IDS/IPS
- Firewalls
- Endpoint protection solutions
- Vulnerability scanning tools
5. Alert Management & Incident Response Support
- Monitor and analyze security alerts from multiple platforms, performing initial triage and prioritization.
- Escalate confirmed or suspected security incidents according to defined procedures.
- Support incident investigations, containment, and remediation efforts in collaboration with Information Security and IT teams.
- Provide timely updates and documentation during incident resolution.
6. Threat Detection & Proactive Security Activities
- Participate in proactive threat-hunting activities using available threat intelligence sources.
- Investigate indicators of compromise (IOCs), emerging threats, and potential vulnerabilities within the environment.
Required Qualifications
- Bachelor’s degree in Computer Science, Information Security, or a related field.
- 2–4 years of experience working as a SOC Analyst with a focus on IT infrastructure and network security.
- Hands-on experience with SIEM platforms, preferably Wazuh.
- Familiarity with CyberArk, Zabbix, and other SOC-related tools.
- Strong understanding of logging, event correlation, and monitoring across hybrid environments.
- Exposure to administration and monitoring of security tools such as IDS/IPS, firewalls, antivirus, and EDR solutions.
The Ideal Candidate Will Be Able To
- Investigate, analyze, and respond to security incidents effectively.
- Perform detailed log analysis and threat detection across multiple security platforms.
- Triage, escalate, and document security incidents in accordance with established procedures.
- Support incident response, recovery, and remediation activities.
- Research and analyze threat intelligence, adversary TTPs using the MITRE ATT&CK framework, and emerging malware trends.
- Track, analyze, and report on newly disclosed CVEs and exploit activity.
- Conduct risk assessments and maintain accurate risk registers.
Work Location: In person