Soc Level 1 Analyst
Tasks
- Analyze security logs and events
- Collect indicators of compromise
- Correlate alerts across multiple sources
- Create and maintain incident tickets
- Differentiate false positives from true incidents
- Document incident evidence
- Escalate incidents to SOC L2
- Follow up on inactive assets
- Handle SOC requests through ticketing and automation tools
- Identify recurring noisy alerts
- Monitor security alerts
- Participate in shift handovers
- Perform SOC operational health checks
- Recommend improvements to correlation rules and playbooks
- Track SLAs and incident trends
- Triage security incidents
- Update SOC documentation and procedures
- Validate suspicious activity
Perks/Benefits
- 24 7 shift coverage experience
- Collaborative fast-paced environment
- Continuous learning
- Enterprise scale exposure
- Hands on modern SOC tooling
- Structured onboarding
Skills/Tech-stack
Alert Correlation | Brute Force | Brute Force Detection | EDR | Firewall | Hash analysis | IAM | IDS/IPS | IP Address Analysis | IP address | Incident Triage | Incident documentation | Indicator of Compromise | Log Analysis | Malware analysis | Microsoft Defender | Phishing analysis | SIEM | SOAR | Security monitoring | ServiceNow | Threat Intelligence
Education
N/A
Related jobs
- No jobs found.