Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
💼 Security Operations Center Analyst (L1)
🌍 Portugal (Hybrid – 3 days onsite) | 📅 Starting January 2026 | 💼 6-Month Contract
At wBrain, we’re seeking a motivated Level 1 SOC Analyst to join a mature and fast-paced Security Operations Center (SOC) team.
This role is ideal for professionals who are passionate about cybersecurity, eager to develop their technical expertise in incident management, and ready to contribute to a mission-critical environment focused on detection, analysis, and response.
🧭 Mission
Support the ongoing protection of enterprise systems and data by monitoring security alerts, performing triage activities, and escalating incidents according to defined protocols.
⚙️ Key Responsibilities
- Monitor and analyze security events and alerts from multiple sources (SIEM, IDS/IPS, endpoint solutions, firewalls, etc.);
- Perform first-level triage and validate the severity and impact of detected incidents;
- Escalate confirmed or critical incidents to Level 2/Level 3 analysts for deeper investigation;
- Document incidents, investigation results, and remediation actions in accordance with SOC procedures;
- Collaborate with other cybersecurity teams to support incident response activities;
- Participate in continuous improvement efforts, refining detection rules and playbooks;
- Ensure compliance with defined SLAs and maintain a proactive cybersecurity mindset.
🧩 Requirements
- 1–2 years of experience in a SOC or cybersecurity operations environment (internship experience may be considered);
- Strong interest in incident management, threat detection, and response workflows;
- Familiarity with SIEM tools (e.g., Splunk, Sentinel, QRadar, ArcSight);
- Basic understanding of network protocols, firewalls, and endpoint protection tools;
- Strong analytical and problem-solving skills;
- Effective communication in English (written and spoken);
- Availability to work in a hybrid model (3 days onsite in Portugal).
💡 Nice to Have
- Experience with MITRE ATT&CK, NIST, or ISO 27035 frameworks;
- Basic knowledge of malware analysis or phishing investigation;
- Relevant certifications (e.g., CompTIA Security+, EC-Council CSA, or Splunk Certified User).
⚙️ Engagement Details
- 📍 Location: Portugal (Hybrid – 3 days onsite)
- 📅 Start Date: January 2026
- ⏱ Duration: 6 months (extendable)
- 💼 Contract Type: B2B / Freelance
- 🤝 Project Type: SOC Operations and Incident Response
📩 Interested?
Send your CV to [email protected] with the subject line:
- “SOC Analyst L1 – Portugal”
Ready to apply?
Join wBrain and take your career to the next level!
Application takes less than 5 minutes

