|
The SOC Analyst (Entry Level) supports 24x7 security monitoring and incident response operations. The role focuses on identifying, triaging, and escalating cybersecurity events to protect the organisation's systems, networks, and data.
Key Responsibilities
-
Monitor security alerts and events using SIEM, EDR, and other security tools
-
Perform initial triage and analysis of security incidents
-
Escalate confirmed or high risk incidents according to established playbooks
-
Document findings, actions taken, and lessons learned in ticketing systems
-
Support incident response, containment, and recovery activities
-
Assist in threat hunting and vulnerability management activities
-
Maintain situational awareness of emerging threats and vulnerabilities
Requirements
-
Diploma or Degree in Cybersecurity, Information Security, Computer Science, or related field
-
Basic understanding of networking (TCP/IP, DNS, firewalls), operating systems (Windows/Linux), and security concepts
-
Familiarity with SIEM, endpoint protection, or log analysis tools (academic or internship exposure acceptable)
-
Strong analytical thinking and attention to detail
-
Ability to work shifts in a 24x7 SOC environment
-
Good written and verbal communication skills
Preferred (Optional)
-
Industry certifications (e.g., CompTIA Security+, CEH)
-
Exposure to frameworks such as National Institute of Standards and Technology (NIST CSF) or MITRE ATT&CK
|