Hitachi

SOC Analyst, Level 1 – Internship

Hitachi

internship

Posted on:

Location Type: Remote

Location: Poland

Visit company website

Explore more

AI Apply
Apply

Job Level

About the role

  • Monitor and investigate security alerts using Splunk, Microsoft Sentinel, and Elastic
  • Perform initial triage and analysis of security events and incidents
  • Identify false positives and escalate confirmed threats to SOC Level 2 analysts
  • Follow incident response playbooks and SOC procedures
  • Document incidents, investigations, and actions taken
  • Monitor logs across cloud and on-prem environments
  • Assist with basic threat hunting and vulnerability monitoring
  • Stay current with emerging cyber threats and attack techniques
  • Participate in 24/7 SOC operations , including evening and night shifts

Requirements

  • Bachelor’s degree in Cybersecurity, IT, Computer Science, or related field (or equivalent experience, Students/Graduates can also apply)
  • Basic understanding of networking concepts (TCP/IP, DNS, HTTP/HTTPS, firewalls)
  • Knowledge of common threats (phishing, malware, brute-force, DDoS)
  • Familiarity with SIEM concepts and log analysis
  • Strong analytical and problem-solving skills
  • Good written and verbal communication skills
  • Willingness to work evening and night shifts
Benefits
  • Structured SOC onboarding and training
  • Clear career progression (SOC Level 2 / Level 3)
  • Exposure to real-world enterprise security incidents
  • Supportive and collaborative team environment

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
security alerts monitoringincident responsethreat huntingvulnerability monitoringlog analysisnetworking conceptsSIEM conceptsTCP/IPDNSHTTP/HTTPS
Soft skills
analytical skillsproblem-solving skillswritten communicationverbal communication
Certifications
Bachelor’s degree in CybersecurityBachelor’s degree in ITBachelor’s degree in Computer Science