Tier 1 Security Operations Center (SOC) Analyst
As a Tier 1 SOC Analyst, you will play a critical role in the 24/7 security monitoring, detection, and incident response efforts of the organization. You will be the first line of defense, responsible for triaging and investigating security incidents and alerts across endpoints, networks, and cloud environments. Your work ensures the protection of sensitive information and supports the organization's overall cybersecurity posture.
Key Responsibilities:
Security Monitoring & Analysis:
- Monitor and analyze security incidents using SIEM tools and ticketing systems. Perform initial triage and investigation of alerts to identify potential malicious activity.
Incident Response & Escalation:
- Respond to security threats following established playbooks and coordinate mitigation efforts with Tier 2, Tier 3 analysts, and SOC leadership. Escalate incidents as needed according to escalation policies.
Documentation & Knowledge Sharing:
- Document actions taken during triage and investigations with accuracy and clarity. Contribute to the development of knowledge management materials to improve SOC operations.
Collaboration & Support:
- Work closely with Engineering and Operations teams to troubleshoot issues and enhance detection capabilities. Ensure compliance with corporate information protection policies when handling sensitive data.
This role is ideal for individuals with a strong analytical mindset, attention to detail, and a passion for cybersecurity. It offers opportunities for growth within a dynamic SOC environment.