Job Openings
Level 1 (L1) SOC Analyst
About the job Level 1 (L1) SOC Analyst
Position Title: Level 1 (L1) SOC Analyst
Location: Abu dhabi
Job Type: Full Time
Role Overview:
The Level 1 SOC Analyst is responsible for the initial monitoring, triage, and escalation of security incidents within the Security Operations Center (SOC). This role focuses on real-time threat detection, log analysis, and first-level response activities.
Key Responsibilities:
- Monitor SIEM (Security Information and Event Management) tools to identify suspicious activities, alerts, and security incidents.
- Perform initial triage of security alerts to determine severity, urgency, and potential impact.
- Escalate confirmed security incidents to Level 2 SOC Analysts for further investigation.
- Identify false positives and adjust monitoring rules accordingly.
- Assist in executing predefined incident response playbooks for common security incidents.
- Document all alerts, incidents, and actions taken in the SOCs ticketing system.
- Support vulnerability scanning activities by providing relevant insights and reporting potential exposures.
- Collaborate with IT and security teams to remediate detected threats when appropriate.
Required Qualifications and Skills:
- 2-6 years experience in SOC operations, security monitoring, or incident response.
- Proficiency in using SIEM platforms such as Splunk, QRadar, or Microsoft Sentinel.
- Familiarity with SOAR (Security Orchestration, Automation, and Response) tools and automation playbooks.
- Ability to identify and analyze common security threats such as phishing, malware, and unauthorized access.
- Strong understanding of network protocols, firewall logs, and intrusion detection systems (IDS/IPS).
- Excellent documentation and reporting skills.
- Certifications such as CompTIA Security+, EC-Council CEH, or equivalent are preferred.