SOC Analyst / Security Monitoring Center Analyst
For our client, a European company in the cybersecurity sector, we are looking for a SOC Analyst to join the Security Monitoring Center and contribute to continuous monitoring, detection, and investigation of security incidents, as well as the development of response processes to ensure effective protection of critical systems and data.
Responsibilities:
-
Monitoring events and alerts in SIEM (Azure Sentinel)
-
Triage, classification and escalation of incidents (L1–L2 level)
-
Participation in incident investigation (log analysis, timeline, IOC, MITRE ATT&CK)
-
Creating and updating response playbooks (SOAR)
-
Working with Fortinet, EDR, DLP, WAF, Cloudflare, Forcepoint
-
Interacting with engineers, red team and vCISO
-
Documenting and reporting on incidents
Requirements:
-
1–3 years of experience in SOC / information security analyst role
-
Knowledge of SIEM architecture and operating principles (preferably Sentinel)
-
Understanding: MITRE ATT&CK, IOC, IR processes, log analysis
-
Experience with Fortinet, EDR, AV, DLP, WAF or similar
-
Skills in working with Windows/Linux logs, AD, network events
-
English — confident working level (reading alerts, reports, meetings)
Will be a plus:
-
Experience in MSSP or information security teams with SLA
-
Skills in working with SOAR, KQL (Sentinel), Splunk, ELK
-
Certificates: CompTIA Security+, CySA+, SC-200, Splunk Core Certified
What we offer:
-
Long-term employment with competitive compensation, based on experience.
-
Possibility to work remotely.
-
An open, transparent and fun work culture.
-
Multi-national team and collaborative work environment.
-
Continuous knowledge sharing with engaged co-workers.
-
Career and professional growth opportunities.