KR
Job Description
Role Overview
As a SOC Analyst supporting one of our client engagements, you will be responsible for monitoring, analysing, and resolving security-related tickets as part of a dedicated 16x5 Security Operations Centre. This role is critical to ensuring timely triage and resolution of incidents, maintaining compliance with our client s security standards, and supporting continuous improvement of detection and response capabilities.
Key Responsibilities
- Ticket Analysis & Resolution: Review, investigate, and resolve security tickets raised through our client s monitoring systems and service desk workflows.
- Alert Triage: Priorities and categories alerts based on severity, impact, and relevance to our client s threat landscape.
- Incident Documentation: Maintain accurate and detailed records of investigations, actions taken, and resolution outcomes in our client s ticketing system.
- Collaboration: Work closely with our client s internal teams, including infrastructure, application, and compliance teams, to ensure coordinated incident handling.
- Playbook Execution: Follow and refine client-specific response playbooks and standard operating procedures (SOPs).
- Shift Handover: Ensure clear and complete handover documentation between shifts to maintain continuity of operations.
- Required Skills & Qualifications1 3 years of experience in a SOC or cybersecurity operations role.
- Familiarity with SIEM platforms (e.g., Microsoft Sentinel, Log Rhythm), ticketing systems (e.g., ServiceNow, Xurrent), and endpoint protection tools (e.g., Microsoft Defender, Sentinel One).
- Experience supporting and resolving common SOC playbook scenarios (e.g., phishing emails, Windows/Linux malware, Microsoft 365/ Entra ID account compromise)
- Strong analytical skills and attention to detail in reviewing logs, alerts, and incident data.
- Understanding of cybersecurity frameworks such as MITRE ATT&CK and NIST.
- Excellent written and verbal communication skills for documenting incidents and collaborating with stakeholders.
- Bachelor s degree in Computer Science, Information Security, or a related field.
- Preferred Certifications Comp TIA Security+, CEH, or Microsoft SC-200.
- ITIL Foundation (for understanding ticketing and service workflows).
- Working Hours Rotational shifts within a 16x5 schedule (Monday to Friday).
- After-hours and weekend on-call rotation
- Flexibility to support critical incidents outside standard hours when required.