Position Summary:
As a Cyber Threat (SOC) Analyst, you will monitor and analyze security events using various cyber defense tools. You'll perform 24x7 surveillance, assess potential threats, and escalate incidents when necessary to protect the company from cyber risks.
Key Responsibilities:
- Monitor and analyze internal and external security data to detect potential threats and vulnerabilities.
- Identify and respond to security incidents, distinguishing between real threats and benign activities.
- Use cyber defense tools for continuous monitoring and threat detection.
- Develop scripts and fine-tune SIEM rules to automate threat analysis.
- Provide incident response support and generate actionable threat intelligence.
- Hunt for indicators of compromise (IOCs) and analyze threat actor tactics, techniques, and procedures (TTPs).
Requirements:
- Degree or Diploma in Computer Science, Computer Engineering, or Information Security.
- 5+ years of experience in a SOC or CERT/CIRT environment.
- Familiarity with network tools (ping, traceroute, nslookup) and incident response.
- Security certifications (GSEC, GCIH, GCIA, etc.) and scripting skills (Python, Bash, PowerShell) are a plus.
- Knowledge of OWASP Top 10, MITRE ATT&CK, Cyber Kill Chain, and DevSecOps is preferred.
- Able to work 12-hour shifts and adapt to changing schedules.
This role requires strong analytical skills, cybersecurity expertise, and the ability to respond quickly to emerging threats.