Associate SOC Analyst at NCC Group monitoring security incidents and collaborating with a cybersecurity team. Contributing to the organisation's cybersecurity posture through analysis and threat mitigation.
Responsibilities
Monitor health and security alerts and events from various sources including SIEM systems, IDS/IPS, and other monitoring tools
Conduct initial triage of security incidents to assess their severity and potential impact on the organization
Document and maintain incident details, including initial findings, actions taken, and any relevant evidence
Communicate findings and recommendations clearly and concisely to technical and non-technical audiences
Initiate escalation procedure to counteract potential threats, vulnerabilities and threat actors both internally and externally
Collaborate with other SOC team members, IT staff, and relevant stakeholders to effectively respond to security incidents
Provide customer service that always exceeds our customers’ expectations
Contribute to the creation and maintenance of security documentation, including incident response playbooks, standard operating procedures, and knowledge base articles
Document and conform to processes related to security monitoring procedures
Compilation and review of service focused reporting
Perform other duties as assigned
Requirements
Bachelor’s degree in computer science, Information Security, or related field (or equivalent experience)
Relevant certifications such as CompTIA Network+, Security+
Basic understanding of networking protocols, operating systems, and security technologies
Familiarity with security tools such as SIEM, IDS/IPS, antivirus, and vulnerability scanning tools
Ability to interpret and analyse security logs and events generated by various systems
Flexibility to quickly learn and adapt to new security tools, technologies, and processes
Strong analytical and problem-solving skills
Good communication skills, both written and verbal
Ability to work collaboratively as part of a team
Relevant certifications such as CompTIA CySA+, GCIH, CSA, CEH (desirable)
Hands-on experience with SIEM platforms (e.g., Splunk, ELK Stack, IBM QRadar)
Proficiency with security tools such as IDS/IPS, antivirus, EDR, vulnerability scanning tools
Familiarity with scripting languages (e.g., Python, PowerShell) for automation and analysis tasks
Director of Security Operations overseeing incident response tasks at Gartner. Leading a geographically dispersed team and improving capabilities for detecting and responding to threats.
Senior Manager for Product Security Ops & Strategy at Salesforce overseeing strategic initiatives and ensuring alignment with security goals. Driving operational excellence and executive communication across teams.
Security Operations Manager responsible for planning and managing security programs at Cox Enterprises. Collaborating with stakeholders and analyzing security vulnerabilities while conducting investigations.
Security Operations Centre Analyst for Paysafe, responding to real - time security alerts and assisting Incident Response in security events. Requires collaboration in a global team environment with various security frameworks.
SOC Analyst focusing on real - time security monitoring and incident response for Atos Group in Bengaluru, ensuring proactive threat detection and effective response to incidents.
Manage global corporate security operations programs at OpenAI, collaborating across teams to enhance security measures. Focus on operational standards and program development for effective security initiatives.
Senior SOC Analyst leading advanced security monitoring and response across various platforms. Collaborating with teams to strengthen security posture and mentor junior analysts.
SOC Analyst developing cybersecurity solutions at Capgemini for leading organizations. Engaging in incident response and security operations in a collaborative environment with global colleagues.