Match score not available

Security Operations Center Level 1 Analyst | Remote

unlimited holidays - extra holidays - extra parental leave - long remote period allowed
Remote: 
Full Remote
Contract: 
Experience: 
Junior (1-2 years)
Work from: 

Offer summary

Qualifications:

1-2 years of IT or cybersecurity experience, Basic knowledge of network protocols, TCP/IP, Entry-level certifications like CompTIA Security+ preferred.

Key responsabilities:

  • Monitor and analyze alerts using SIEM tools
  • Conduct initial analysis and triage incidents
  • Document incidents and collaborate with teams
TASQ Staffing Solutions logo
TASQ Staffing Solutions Human Resources, Staffing & Recruiting TPE https://www.tasq.work
11 - 50 Employees
See more TASQ Staffing Solutions offers

Job description

Role summary

  • The SOC Analyst Level 1 will report in a hybrid work - either work remotely routing through the Internet or will report to the office as required.
  • And provide technical, administrative, and procedural support for the company's Group and its clients information security program to protect the confidentiality, integrity, and availability of information systems in accordance with the company's Groups business objectives, regulatory requirements, and strategic goals.

Specific responsibilities

  • Monitoring & Detection:
    • SIEM Tools: Experience with Security Information and Event Management (SIEM) platforms (e.g., Splunk, QRadar, AlienVault, Rapid7) to monitor, analyse, and respond to alerts.
    • Log Analysis: Ability to review logs from various sources (firewalls, IDS/IPS, endpoint protection) to detect anomalies and potential threats.Provide first-level contact to clients by manning virtual phones to receive called-in requests
  • Incident Triage & Response:
    • Initial Analysis: Conduct first-level triage of alerts, determining the nature of incidents, their severity, and potential impact.
    • Escalation: Understand when to escalate incidents based on predefined criteria, involving senior analysts when necessary.
    • Playbook Execution: Follow incident response playbooks and procedures for common threat scenarios like phishing, malware detection, and unauthorized access.
  • Threat Intelligence & Reporting:
    • Threat Awareness: Basic understanding of the latest threats, vulnerabilities, and attack methods.
    • Documentation: Consistent and thorough documentation of incidents, resolutions, and actions taken.
    • Collaboration: Clear communication with internal teams and external stakeholders for incident coordination.

Skillset & Qualifications:

  • Technical Skills: Basic knowledge of network protocols, TCP/IP, firewalls, and endpoint security solutions.
  • Ideally certified with entry-level qualifications like CompTIA Security+, Certified SOC Analyst (CSA), or GIAC Security Essentials (GSEC). Soft Skills:
  • Strong analytical thinking, attention to detail, and effective communication, especially in high-pressure situations.

Experience Level:

  • Work Background: Typically, 1-2 years of IT or cybersecurity-related experience; recent graduates with strong foundational knowledge and a willingness to learn may also be considered.

Requirements:

  • Stable 10mbps Internet connectivity minimum to properly perform required tasks
  • Backup connectivity same capacity to ensure continuity in the event of primary connectivity unavailability
  • Everything is hosted in the cloud AND within the client/partner environment online

Required profile

Experience

Level of experience: Junior (1-2 years)
Industry :
Human Resources, Staffing & Recruiting
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Analytical Thinking
  • Detail Oriented

Security Operations Center (SOC) Analyst Related jobs