
SOC Analyst, Level 1 – Internship
Hitachi
internship
Posted on:
Location Type: Remote
Location: Poland
Visit company websiteExplore more
Job Level
About the role
- Monitor and investigate security alerts using Splunk, Microsoft Sentinel, and Elastic
- Perform initial triage and analysis of security events and incidents
- Identify false positives and escalate confirmed threats to SOC Level 2 analysts
- Follow incident response playbooks and SOC procedures
- Document incidents, investigations, and actions taken
- Monitor logs across cloud and on-prem environments
- Assist with basic threat hunting and vulnerability monitoring
- Stay current with emerging cyber threats and attack techniques
- Participate in 24/7 SOC operations , including evening and night shifts
Requirements
- Bachelor’s degree in Cybersecurity, IT, Computer Science, or related field (or equivalent experience, Students/Graduates can also apply)
- Basic understanding of networking concepts (TCP/IP, DNS, HTTP/HTTPS, firewalls)
- Knowledge of common threats (phishing, malware, brute-force, DDoS)
- Familiarity with SIEM concepts and log analysis
- Strong analytical and problem-solving skills
- Good written and verbal communication skills
- Willingness to work evening and night shifts
Benefits
- Structured SOC onboarding and training
- Clear career progression (SOC Level 2 / Level 3)
- Exposure to real-world enterprise security incidents
- Supportive and collaborative team environment
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
security alerts monitoringincident responsethreat huntingvulnerability monitoringlog analysisnetworking conceptsSIEM conceptsTCP/IPDNSHTTP/HTTPS
Soft skills
analytical skillsproblem-solving skillswritten communicationverbal communication
Certifications
Bachelor’s degree in CybersecurityBachelor’s degree in ITBachelor’s degree in Computer Science