Associate SOC Analyst at NCC Group monitoring security incidents and collaborating with a cybersecurity team. Contributing to the organisation's cybersecurity posture through analysis and threat mitigation.
Responsibilities
Monitor health and security alerts and events from various sources including SIEM systems, IDS/IPS, and other monitoring tools
Conduct initial triage of security incidents to assess their severity and potential impact on the organization
Document and maintain incident details, including initial findings, actions taken, and any relevant evidence
Communicate findings and recommendations clearly and concisely to technical and non-technical audiences
Initiate escalation procedure to counteract potential threats, vulnerabilities and threat actors both internally and externally
Collaborate with other SOC team members, IT staff, and relevant stakeholders to effectively respond to security incidents
Provide customer service that always exceeds our customers’ expectations
Contribute to the creation and maintenance of security documentation, including incident response playbooks, standard operating procedures, and knowledge base articles
Document and conform to processes related to security monitoring procedures
Compilation and review of service focused reporting
Perform other duties as assigned
Requirements
Bachelor’s degree in computer science, Information Security, or related field (or equivalent experience)
Relevant certifications such as CompTIA Network+, Security+
Basic understanding of networking protocols, operating systems, and security technologies
Familiarity with security tools such as SIEM, IDS/IPS, antivirus, and vulnerability scanning tools
Ability to interpret and analyse security logs and events generated by various systems
Flexibility to quickly learn and adapt to new security tools, technologies, and processes
Strong analytical and problem-solving skills
Good communication skills, both written and verbal
Ability to work collaboratively as part of a team
Relevant certifications such as CompTIA CySA+, GCIH, CSA, CEH (desirable)
Hands-on experience with SIEM platforms (e.g., Splunk, ELK Stack, IBM QRadar)
Proficiency with security tools such as IDS/IPS, antivirus, EDR, vulnerability scanning tools
Familiarity with scripting languages (e.g., Python, PowerShell) for automation and analysis tasks
Lead the Local Vodafone Business Service Operations Centre in Athens, Greece. Focus on delivering managed security, cloud, and SaaS services with operational excellence.
SOC Analyst responsible for monitoring threats and vulnerabilities in IT systems. Engaging with clients and providing incident remediation documentation and recommendations.
Security Analyst managing network security tools to protect systems at Riachuelo. Collaborating with teams to ensure operational resilience and security compliance.
Intermediate Security Operations Centre Analyst involved in IT security operations for a dynamic IT provider. Collaborating with internal teams for incident detection and response across various platforms.
Security Operations Centre Analyst for Long View's IGS branch, focused on incident detection and response. Collaborating with teams to monitor, identify, and remediate security incidents.
Security Operations Lead overseeing global SOC operations and AI product integration at Replit. Leading monitoring and incident response across multi - cloud environments and AI workloads.
SOC Engineer at Replit monitoring and assessing emerging threats in cloud infrastructure and AI coding environments. Conducting investigations and collaborating with teams for mitigation strategies.
Cybersecurity Incident Response Engineer in Comcast's Security Incident Response Team mitigating threats and restoring environments following incidents. Working with advanced technologies to safeguard customers and infrastructure.
Director of Security Operations responsible for strategic leadership and operational excellence in security at Abridge. Leading teams focused on preventing, detecting, and responding to security threats.