Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
SOC Analyst L1 role will play a crucial role in monitoring and responding to security incidents for various client environments. The primary focus will be on identifying and escalating potential threats while learning the ropes of security operations.
Job Responsibilities:
- Monitor and analyze security alerts from SIEM and SOAR platforms
- Escalate incidents to higher-level analysts as needed
- Assist in incident triage and documentation
- Support continuous improvement of SOC processes
- Continuously monitor security tools and SIEM dashboards for potential security incidents, including alerts, anomalies, and suspicious activities.
- Prioritize and triage events based on severity, urgency, and potential impact, following established escalation procedures.
- Conduct initial investigations using threat intelligence feeds, security documentation, and available resources to determine threat potential and scope.
- Document findings and actions taken in a clear and concise manner.
- Follow established incident response (IR) procedures and playbooks to contain and remediate security incidents within your assigned level of responsibility.
- Collaborate effectively with senior analysts and security engineers to escalate complex or high-priority incidents as needed.
- Communicate effectively with internal stakeholders and, if authorized, with external parties to provide updates and ensure coordinated response efforts.
- Maintain documentation: Update and maintain documentation related to procedures, policies, and incident response activities.
- Actively participate in training: Participate in training programs and workshops to learn new security skills and technologies.
- Stay updated on threats: Continuously stay updated on emerging threats, vulnerabilities, and attack vectors.
Qualification and Experience:
- Bachelors' degree in Security or Information Technology.
- Hands-on experience with Microsoft Sentinel SIEM
- Familiarity with FortiSOAR for incident response and automation
- Strong analytical and problem-solving skills
- Willingness to work in a 24/7 SOC environment
- Strong understanding of cybersecurity fundamentals and concepts.
- Ability to work effectively in a fast-paced, dynamic environment.
- Strong communication and interpersonal skills.
- Adaptability and willingness to learn new technologies and processes.
Key Skills
Ranked by relevanceReady to apply?
Join Moro Hub and take your career to the next level!
Application takes less than 5 minutes

