Job Openings Security Analyst

About the job Security Analyst

About the role:

The ideal candidate will have experience in monitoring, analyzing, and responding to security events across enterprise environments. They should be skilled in incident triage, investigating alerts using SIEM and XDR tools, and ensuring timely detection and escalation of threats. A strong understanding of incident response, hands-on SOC experience, and the ability to work effectively in a fast-paced environment.


Responsibilities:

  • Monitor security events and alerts across the enterprise environment on a 24/7 basis
  • Analyze and validate incidents generated from SIEM and Security tools.
  • Perform Initial triage, including false positive/false negative analysis
  • Investigate logs and security data to identify threats and root causes
  • Perform security event analysis and investigation across Windows and Unix systems
  • Classify and prioritize incidents based on severity and business impact
  • Escalate complex incidents to senior analysts in line with defined procedures
  • Support SIEM operations, including log onboarding, configuration, and tuning
  • Identify gaps in existing security controls and recommend improvements
  • Contribute to tuning and optimization of SIEM and security monitoring tools
  • Collaborate with stake holders during incident handling
  • Stay up to date with emerging threats, vulnerabilities, and attack techniques
  • Review incident response reports and ensure accuracy before escalation
  • Maintain detailed documentation and reporting dashboards
  • ­­Drive continuous improvement through threat analysis and lessons learned

Required Skills & Experience:

  • 3+ years of experience in Cybersecurity Operations is required
  • Strong hands-on experience with SIEM platforms (Splunk SIEM, MS Sentinel, InsightIDR preferred)
  • Strong hands-on experience with XDR plarforms (CrowdStrike, Microsoft Defender preferred)
  • Strong knowledge of incident response lifecycle and security event triage
  • Experience analyzing logs and identifying attack patterns
  • Knowledge of components of network attack and their relationship to threats and vulnerabilities
  • Ability to work in high-pressure, shift-based SOC environments

Education and Certifications:

  • Bachelor's or Master's degree in Computer Science, Information Security, Cybersecurity or equivalent is required
  • CompTIA Security+, CySA+ or SANS GIAC certifications (e.g., GCIH, GCIA) preferred

What We Offer

  • Market-competitive salary
  • Career growth opportunities
  • Learning & development programs
  • On-the-job training
  • Medical coverage (IPD)
  • Life insurance
  • Paid leaves (Annual, Casual, Sick, Marriage, Maternity, Paternity, Hajj, Bereavement)
  • Provident Fund
  • Employee Old Age Benefits (EOBI)
  • Employee engagement & wellness initiatives

Location: NASTP, Cantt, Lahore.

Shift: EST