Security Analyst (SOC L1) – Onsite Shifting

SecurXcess defensive team monitors, analyzes, and responds to real-world cyber threats to protect and strengthen customer security operations.

Requirements:

-Minimum 2 years of experience in an IT or cybersecurity environment.
-Diploma or Degree in Information Systems, Information Security, or a related field.
-Strong understanding of TCP/IP, networking, operating systems, and cybersecurity fundamentals.
-Hands-on experience with firewalls, antivirus, and endpoint detection solutions.
-Proficiency in Linux (command line operations, file editing, and scripting).
-Sound understanding of security threats and attacker techniques, including vulnerability exploitation and privilege escalation.
-Familiarity with common security tools such as IDS/IPS, AV, HIDS/HIPS, WAF, firewalls, and proxies.
-Strong communication and analytical skills.
-Scripting experience with Python, Bash, or PowerShell is a plus.
-Willingness to work in a 24×7 rotating shift schedule, including weekends and extended hours if required.
-Ability to be on standby for SOC operations.
-Professional certifications such as MCP, MCSE, CCNA Security, CEH, Security+, or CSA are preferred.

Job Description:

-Perform continuous security monitoring, incident response, and vulnerability management within the SOC environment.

-Analyze alerts from multiple sources such as SIEM, IDPS, firewalls, antivirus, anomaly detection, and endpoint inspection tools.

-Investigate and respond to potential security incidents, escalating cases when necessary.

-Ensure smooth daily operations and functionality of SOC systems and tools.

-Develop and refine detection use cases to improve threat identification and minimize false positives.

-Support ongoing enhancement of SOC incident response processes and playbooks.

-Handle Change Requests (CRs), Service Requests (SRs), and other operational tasks as assigned. -Participate in ad hoc assignments or projects as needed.

Apply for this position

Allowed Type(s): .pdf, .doc, .docx