SOC L1 Analyst, Information Security

Added
less than a minute ago
Type
Full time
Salary
Salary not provided

Related skills

azure aws cloud security incident response siem

๐Ÿ“‹ Description

  • Real-Time monitoring of security alerts across SIEM, EDR, cloud, and email.
  • Initial triage to set priority, severity, and potential impact.
  • Follow SOPs to investigate, validate, and classify alerts.
  • Escalate validated incidents to L2 for deeper investigation.
  • Document triage steps, findings, and communications in the ticketing system.
  • Use SOAR playbooks and core tools to enrich alerts and gather data.

๐ŸŽฏ Requirements

  • Bachelor's degree in CS/Info Security or equivalent practical experience/certs.
  • 0-2 years in IT, NOC, or security ops.
  • Willingness to work in a 24/7 rotational shift environment.
  • Core skills: attention to detail, analytical thinking, clear communication.
  • Basic networking (TCP/IP) and cloud security knowledge (AWS/Azure).
  • Eagerness to learn SOAR, SIEM, EDR; CompTIA Security+/Network+ preferred.

๐ŸŽ Benefits

  • Be at the forefront of a cloud-focused Security Operations Center.
  • Excellent training and mentorship to build a cybersecurity career.
  • Foundational experience with cloud security, automation, and threat intelligence.
  • Clear career path to L2, L3, and senior roles.
Share job

Meet JobCopilot: Your Personal AI Job Hunter

Automatically Apply to Engineering Jobs. Just set your preferences and Job Copilot will do the rest โ€” finding, filtering, and applying while you focus on what matters.

Related Engineering Jobs

See more Engineering jobs โ†’