Critical Software

SOC Analyst

Critical Software

full-time

Posted on:

Location Type: Hybrid

Location: CoimbraPortugal

Visit company website

Explore more

AI Apply
Apply

About the role

  • Monitor security alerts and events from EDR, identity protection, cloud security platforms, and other security tools
  • Perform initial triage, enrichment, and classification of alerts following SOC playbooks
  • Investigate low- to medium-complexity attack patterns, including: Adversary-in-the-Middle (AitM) attacks, suspicious login patterns, endpoint malware detections, privilege misuse indicators, suspicious email or phishing activities
  • Correlate events across multiple systems to identify potential malicious behavior
  • Use simple scripts (PowerShell, Python, KQL, Bash) for data enrichment, identifying anomalies, and performing small, targeted hunts in specific log sources
  • Support senior analysts with observations gained during reconnaissance hunting activities
  • Act as the first responder in the incident handling process
  • Document findings and escalate incidents to Tier 2/3 analysts or the external SOC with clear, structured communication
  • Collaborate with the external SOC provider to validate alerts, coordinate investigations, and ensure accurate incident classification
  • Execute containment steps defined in playbooks when authorized
  • Serve as an active contributor within the global cybersecurity team, maintaining strong partnerships across IT, operations, and business units
  • Communicate technical information clearly to diverse stakeholders, both technical and non-technical
  • Participate in daily SOC operational meetings, knowledge sharing, and cross-team collaboration
  • Maintain accurate and comprehensive investigation documentation within ticketing and reporting systems
  • Suggest improvements to detection rules, use cases, and SOC processes based on observed patterns
  • Follow established SOC procedures while contributing to continuous improvement initiatives
  • Follow existing SOC playbooks consistently during investigations and incident response workflows
  • Contribute to the refinement, enhancement, or creation of Tier 1 playbooks, ensuring they accurately reflect real investigation needs.

Requirements

  • Bachelor's degree in Computer Science, Information Technology, or equivalent professional experience
  • 2+ years of experience in IT Security, SOC, Incident Response, or similar fields
  • Foundational knowledge of cybersecurity principles, common attack vectors, and threat actor behaviours
  • Understanding of the Cyber Kill Chain and MITRE ATT&CK frameworks and their application in investigations
  • Ability to think from an attacker's perspective to better recognize malicious intent and weak signals
  • Experience with EDR, identity, email, or cloud security tools
  • Basic scripting ability (PowerShell, Python, KQL, Bash) for automation, enrichment, or simple hunting tasks
  • Strong communication skills to work effectively with global stakeholders and external SOC teams
  • High attention to detail and structured documentation habits
  • Attacker mindset: Ability to anticipate adversary actions and identify early indicators
  • Analytical thinking: Recognizing patterns, anomalies, and correlations across logs
  • Analytical mindset: Quickly interpret data and identify suspicious patterns
  • Collaboration: Ability to work effectively with globally distributed teams.
Benefits
  • Private Health Insurance
  • Employee Assistance Programme
  • Home Office Support
  • Extra Holidays
  • Extra Parental Leave
  • Flex-time
  • Gradual Return to Work Support
  • Away From Keyboard - Sabbatical programme
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
PowerShellPythonKQLBashEDRcloud securityincident responsecybersecurity principlesattack patternsthreat actor behaviours
Soft Skills
strong communication skillsattention to detailanalytical thinkingcollaborationstructured documentationattack mindsetability to recognize patternsability to anticipate adversary actionsclear communicationcross-team collaboration