Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Key Responsibilities
- Monitor security alerts via SIEM/XDR tools (e.g., Splunk, Microsoft Sentinel, QRadar) for threats across networks, endpoints, and cloud environments.
- Analyze logs from firewalls, IDS/IPS, EDR, and other security solutions to identify suspicious or malicious behavior.
- Perform triage, classification, and initial investigation of events such as malware infections, phishing attempts, and DDoS attacks.
- Execute predefined incident response playbooks, including host isolation, IP blocking, and alert validation.
- Escalate verified incidents to L2/L3 teams with thorough documentation and supporting evidence.
- Apply threat intelligence (e.g., MITRE ATT\&CK framework) to enrich and contextualize alerts.
- Monitor dark web and threat intelligence feeds for indicators of compromise (IoCs) relevant to the business.
- Maintain accurate incident records in ticketing systems such as ServiceNow or Jira, documenting timelines, actions, and outcomes.
- Generate daily shift handover reports summarizing threat activity, false positives, and system performance.
- Participate in tuning SIEM correlation rules and detection use cases to reduce false positives.
- Validate and review configuration settings of security tools (e.g., firewall rules, EDR policies) for compliance and effectiveness.
- Diploma or Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field.
- 1+ year experience in cybersecurity monitoring or 2+ years in IT/networking with security exposure.
- Familiarity with SIEM/XDR tools such as Splunk, Microsoft Sentinel, QRadar, etc.
- Hands-on experience with EDR, IDS/IPS, firewalls, and email security solutions.
- Understanding of Windows and Linux security logs and analysis techniques.
- Strong knowledge of network protocols (TCP/IP, DNS, VPN, HTTP/S).
- Awareness of common cyberattack vectors (e.g., phishing, malware, brute force).
- Foundational understanding of cloud security principles (AWS, Azure, or GCP).
- Industry certifications such as CompTIA Security+, CySA+, CEH, or equivalent.
- Vendor-specific certifications (e.g., Splunk Core User, Microsoft SC-200) are an advantage.
- Must be willing to work rotational 24/7 shifts, including weekends and public holidays.
EA Licence No.:18S9405 / EA Reg. No.:R1330864
Percept Solutions is expanding and actively seeking talented individuals. We encourage applicants to follow Percept Solutions on LinkedIn at https://www.linkedin.com/company/percept-solutions/to stay informed about new opportunities and events.
Ready to apply?
Join Percept Solutions and take your career to the next level!
Application takes less than 5 minutes