Tech Stack
Cyber SecurityFirewalls
About the role
- Continuously monitor security alerts from SIEM, EDR, firewalls, and endpoint security tools
- Analyze security events and perform initial triage of alerts to determine if they are false positives or require escalation
- Work with L2 Analysts to investigate and contain security incidents
- Assist in log analysis and data correlation to identify attack patterns
- Document and communicate findings in clear and concise reports
- Track trends in security events and report unusual activities
- Collaborate with other teams to refine detection rules and improve incident response
- Stay updated on emerging threats, attack techniques, and security best practices
- Provide feedback to improve SOC playbooks, detection rules, and automation
- Collaborate with cross-functional teams to improve security posture
Requirements
- Minimum of 1 years of experience in a SOC or related cybersecurity role
- Basic understanding of security concepts, including malware analysis, network security, and intrusion detection
- Experience with security tools such as SIEM, endpoint detection & response (EDR), and vulnerability scanners
- Strong analytical and problem-solving skills with attention to detail
- Basic knowledge of cyber threat frameworks (MITRE ATT&CK, Cyber Kill Chain)
- Strong communication and collaboration abilities
- Relevant certifications such as CompTIA Security+, Microsoft SC-200, or equivalent are a plus
- Health coverage
- Wellbeing programs
- Paid leave (vacation, sick, parental)
- Retirement plans
- Learning opportunities
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
malware analysisnetwork securityintrusion detectionlog analysisdata correlationsecurity event analysisincident responsedetection rulesautomation
Soft skills
analytical skillsproblem-solving skillsattention to detailcommunication abilitiescollaboration abilities
Certifications
CompTIA Security+Microsoft SC-200