As an L1 SOC Analyst, you will be responsible for monitoring alerts and triaging basic security events from SIEM, EDR, and NDR platforms. Your role includes identifying suspicious activities, escalating incidents as per defined SOPs, and supporting the security operations team in daily monitoring tasks.
Key Responsibilities:
Tool Experience (Preferred):
Certifications (Preferred):
Shift Readiness:
This role requires flexibility to work in 24x7 rotational shifts, including nights, weekends, and holidays.
Required Skills:
Keyskills: SOC Monitoring Security Operations Center Cloud Security Incident Logging Exchange Online Protection Azure AD Logs Microsoft Defender for Endpoint EDR IOCs SIEM Threat Intelligence Microsoft Sentinel Darktrace Security Alert Triage QRadar 24x7 Shift NDR LinkShadow
Founded by Cybersecurity stalwarts and passionate investors, CyberShelter (CS) is here to make a difference in how organisations protect their valuable assets. In an industry where practical and cost-effective solutions are rare, CS brings innovative approaches and robust cybersecurity experience to...