Description

Key Responsibilities:
Threat Monitoring & Detection
Monitor network, system, and security logs using SIEM tools (e.g., Splunk, QRadar, LogRhythm).
Identify, investigate, and prioritize potential security threats and events in real-time.
Analyze logs, alerts, and reports to detect and prevent potential cyberattacks or anomalies.
Incident Response
Triage security incidents and escalate as needed based on severity and impact.
Assist in containment, eradication, and recovery of affected systems during incidents.
Document incident findings and response actions clearly and comprehensively.
Security Analysis
Conduct root cause analysis of security events and contribute to post-incident reports.
Participate in threat hunting activities and improve detection techniques.
Stay current with emerging threats, vulnerabilities, and security technologies.
Security Tool Maintenance
Maintain and optimize SOC technologies including SIEMs, EDR, IDS/IPS, and log management tools.
Collaborate with infrastructure and network teams to improve logging and visibility.
Compliance & Reporting
Support compliance efforts related to security frameworks (e.g., ISO 27001, NIST, PCI-DSS).
Create dashboards and reports for security metrics and key performance indicators (KPIs).


Qualifications:
Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent work experience).
1–3 years of experience in a SOC or cybersecurity operations role.
Familiarity with SIEM platforms and tools (e.g., Splunk, AlienVault, IBM QRadar).
Understanding of networking fundamentals (TCP/IP, DNS, HTTP, VPNs).
Knowledge of operating systems (Windows, Linux), malware, and common attack vectors.
Strong analytical and problem-solving skills

Education

Any Graduate