Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
We are looking for a SOC Analyst – L1 to support 24/7 security operations within a telecom environment. The role focuses on real-time threat monitoring, alert triage, and initial incident response, with hands-on use of Splunk for log analysis and investigation.
Key Responsibilities:
- Monitor security alerts and logs using Splunk and other SOC tools
- Perform initial triage and validation of security incidents
- Execute basic incident response actions and escalate to L2/L3 when required
- Track and document incidents in ticketing systems
- Support monitoring of telecom network and IT systems (core, RAN, OSS/BSS)
- Prepare shift reports and ensure proper handover
Requirements:
- 1–3 years of experience in SOC / security monitoring
- Hands-on experience with Splunk
- Basic knowledge of networking and cybersecurity concepts
- Familiarity with telecom environments is a plus
- Willingness to work in a 24/7 shift environment
This is a 12 month contract, with potential to extend
Key Skills
Ranked by relevanceReady to apply?
Join Auxo Talent and take your career to the next level!
Application takes less than 5 minutes

