SOC/Blue Team Analyst

Posted 1 week ago

Join a close-knit and skilled SOC team of 6 cybersecurity professionals.

To succeed in this position, you must have:

  • 3–4+ years of hands-on experience working in a SOC or Blue Team environment
  • Solid experience with at least two different SIEM platforms, such as Splunk, Microsoft Sentinel, Google Chronicle/SecOps, etc.

Responsabilities :

  • Hunt for threats and improve detection strategies
  • Assist the SOC Lead during major incidents and handle minor ones independently
  • Build and optimize Splunk alerts, dashboards, and reports based on operational needs
  • Identify tuning opportunities and collaborate with Engineering to enhance SIEM capabilities
  • Maintain clear, up-to-date documentation for tools and processes
  • Lead the creation of monthly SOC reports and provide insights to key stakeholders

Profile:

  • Bachelor’s or Master’s degree in Computer Science, Cybersecurity, Software Engineering, or a related technical field
  • Deep understanding of SOC operations, incident response, and threat detection
  • At least 3 years of experience in cybersecurity, ideally within Security Operations or Incident Response
  • Solid experience with at least two different SIEM platforms, such as Splunk, Microsoft Sentinel, Google Chronicle/SecOps, etc.
  • Familiarity with tools such as EDR, vulnerability scanners, TIPs, NDR/IPS
  • Comfortable with scripting/programming (e.g., Python)
  • Curious, pragmatic, and passionate about Cybersecurity and staying current with new threats
  • Fluent English, both written and spoken

Prefered Skills:

One or more of the following certifications:

  • Previous experience in Financial Services or Managed Security Services
  • Background in digital forensics, malware analysis, threat intelligence, security engineering, or cloud/network security

Apply now

Choose File
Thank you for your message. It has been sent.
There was an error trying to send your message. Please try again later.