About the role
- Monitoring and analysis of cyber security events from various Security Tools.
- First level contact for MSP to connect with for any support.
- Triage security events and incidents, detect anomalies, and report remediation actions. Execution of SOC procedures.
- Ensure completeness of the incident information.
- Analysis of phishing emails reported by internal end users.
- Escalation of incidents to be handled to L2 SOC team, when relevant.
- Follow up on remediation activities.
- Triage on general information security tickets.
Requirements
- 1-3 years of progressive experience in following areas: Alert Monitoring and Incident Triage.
- Bachelor’s degree from an accredited college / university with basic knowledge of Information Security.
- Keen to learn the security technologies and how security operates.
- Reliability and overall good communication skills.
- Well-developed logical thinking capabilities, to be able to investigate cases.
- Able to work in shift and weekend.
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
alert monitoringincident triagecyber security analysisphishing email analysisSOC proceduresanomaly detectionremediation actionsinformation security
Soft skills
communication skillslogical thinkingreliabilitywillingness to learn