Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Job Title: SOC L1 Analyst
Job Summary:
We are seeking a vigilant and analytical SOC L1 Analyst to join our Security Operations Center (SOC) as a first responder to cyber threats. In this essential role, you will be on the front lines of our cyber defense, responsible for the 24x7 monitoring of security alerts generated by our suite of advanced detection systems. Your primary mission will be to perform initial analysis and triage on a high volume of events, accurately identify potential threats, weed out false positives, and escalate credible incidents to our L2 Incident Response team. The ideal candidate has a passion for cybersecurity, a strong attention to detail, and the ability to work methodically under pressure, following established playbooks to protect our organization.
Responsibilities
● Continuously monitor security alert queues from a variety of detection systems, including Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), Network Detection and Response (NDR), and Intrusion Detection/Prevention Systems (IDS/IPS).
● Perform initial triage and assessment of security alerts to determine their criticality and potential impact, distinguishing between real threats and false positives.
● Enrich alerts with contextual data from various sources to support the investigation process.
● Follow documented Standard Operating Procedures (SOPs) and response playbooks for common security scenarios and alert types.
● Create detailed incident tickets for all suspicious activities, meticulously documenting initial findings, actions taken, and analysis performed.
● Escalate verified security incidents and legitimate threats to SOC L2 Analysts in a timely manner, providing a clear and concise summary of the event.
● Handle rest-level response for security events, which may include basic containment actions as defined by playbooks.
● Stay current with emerging cyber threats, vulnerabilities, and attack methodologies to improve detection capabilities.
Requirements
● 1-2 years of experience in a Security Operations Center (SOC), cybersecurity, or a related IT role. An Associate's or Bachelor's degree in Cybersecurity, Computer Science, or a related eld is preferred.
● Hands-on experience with security tools, particularly SIEM platforms (e.g., Splunk, QRadar, LogRhythm) for event investigation.
● A foundational understanding of networking concepts (TCP/IP, DNS, HTTP), operating systems (Windows, Linux), and core security principles.
● Familiarity with common types of cyberattacks and the Cyber Kill Chain or MITRE ATT&CK framework.
● Strong analytical skills with an exceptional attention to detail and the ability to connect disparate pieces of information.
● Excellent written and verbal communication skills, especially in documenting technical findings clearly and concisely.
● Ability to work effectively in a high-pressure, 24x7 shift-based environment.
● Relevant entry-level certifications such as CompTIA Security+, CompTIA CySA+, or GIAC Security Essentials (GSEC) are highly desirable.
Key Skills
Ranked by relevanceReady to apply?
Join NETS-International Group and take your career to the next level!
Application takes less than 5 minutes

