
SOC Analyst – Level 1
Positions
SOC Analyst – Level 1
Employment:
Full-time
Setup:
WFH
We are seeking a proactive and detail-oriented Security Operations Center (SOC) Analyst Level 1 to join our team. In this entry-level role, you will monitor and respond to security alerts, help mitigate security incidents and support the overall security posture of the organization. As a SOC Analyst Level 1, you will work closely with senior security analysts to identify potential threats and escalate incidents as necessary. This position provides an excellent opportunity for individuals looking to build their careers in cybersecurity.
Key Responsibilities
Monitor Security Events: Continuously monitor security alerts and events through SIEM (Security Information and Event Management) tools to detect potential threats and vulnerabilities.
Incident Triage: Analyze and prioritize security incidents based on severity and risk, following standard operating procedures (SOPs).
Escalate Incidents: Escalate complex or high-severity incidents to higher-level SOC analysts or management for further analysis and resolution.
Log and Document Incidents: Record and document all incidents, including actions taken, in incident management systems.
Conduct Initial Investigations: Perform initial investigations on security incidents, including network traffic analysis, endpoint forensics, and log reviews.
Threat Intelligence: Stay informed about the latest cyber threats and vulnerabilities, and contribute to the SOC’s overall knowledge base.
Support Security Tools and Systems: Assist in the maintenance and optimization of security tools and systems such as firewalls, intrusion detection/prevention systems (IDS/IPS), and anti-virus software.
Collaborate with Teams: Work collaboratively with IT, Network, and other security teams to enhance organizational security.
Compliance and Reporting: Assist in ensuring that security measures comply with industry standards and regulatory requirements.
Continuous Learning: Participate in cybersecurity training and certification programs to develop skills and advance in the cybersecurity field.
Requirements
Education: Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent work experience).
Certifications: CompTIA Security+, Certified Information Systems Security Professional (CISSP), or other relevant certifications (preferred but not required).
Experience: Minimum 1 year of experience as a SOC Analyst or in a similar cybersecurity monitoring roleUnderstanding of networking protocols (TCP/IP, DNS, HTTP/S, etc.).
Strong attention to detail and ability to analyze large volumes of data.
Good problem-solving skills and the ability to think critically under pressure.
Excellent communication skills, Ability to work well in a team environment. both written and verbal.
Strong organizational skills and the ability to handle multiple tasks simultaneously.
Monitor and analyze security alerts from SIEM, EDR, and other security tools, including Tanium and CrowdStrike.
Perform initial triage and analysis of security incidents, determining severity and potential impact.
Escalate high-priority incidents to Tier 2/3 analysts, providing detailed documentation and context.
Investigate and respond to endpoint security events, malware detections, and suspicious activities using Tanium and CrowdStrike platforms.
Document, track, and resolve incidents following established SOC procedures and playbooks.
Collaborate with IT and security teams to contain and remediate threats.
Maintain up-to-date knowledge of current threat vectors, vulnerabilities, and security best practices.
Participate in shift handovers, ensuring accurate incident reporting for seamless 24/7 operations.
Support continuous improvement initiatives within the SOC.
