Associate SOC Analyst at NCC Group monitoring security incidents and collaborating with a cybersecurity team. Contributing to the organisation's cybersecurity posture through analysis and threat mitigation.
Responsibilities
Monitor health and security alerts and events from various sources including SIEM systems, IDS/IPS, and other monitoring tools
Conduct initial triage of security incidents to assess their severity and potential impact on the organization
Document and maintain incident details, including initial findings, actions taken, and any relevant evidence
Communicate findings and recommendations clearly and concisely to technical and non-technical audiences
Initiate escalation procedure to counteract potential threats, vulnerabilities and threat actors both internally and externally
Collaborate with other SOC team members, IT staff, and relevant stakeholders to effectively respond to security incidents
Provide customer service that always exceeds our customers’ expectations
Contribute to the creation and maintenance of security documentation, including incident response playbooks, standard operating procedures, and knowledge base articles
Document and conform to processes related to security monitoring procedures
Compilation and review of service focused reporting
Perform other duties as assigned
Requirements
Bachelor’s degree in computer science, Information Security, or related field (or equivalent experience)
Relevant certifications such as CompTIA Network+, Security+
Basic understanding of networking protocols, operating systems, and security technologies
Familiarity with security tools such as SIEM, IDS/IPS, antivirus, and vulnerability scanning tools
Ability to interpret and analyse security logs and events generated by various systems
Flexibility to quickly learn and adapt to new security tools, technologies, and processes
Strong analytical and problem-solving skills
Good communication skills, both written and verbal
Ability to work collaboratively as part of a team
Relevant certifications such as CompTIA CySA+, GCIH, CSA, CEH (desirable)
Hands-on experience with SIEM platforms (e.g., Splunk, ELK Stack, IBM QRadar)
Proficiency with security tools such as IDS/IPS, antivirus, EDR, vulnerability scanning tools
Familiarity with scripting languages (e.g., Python, PowerShell) for automation and analysis tasks
Director leading security operations strategy and overseeing investigations at Ford Motor Company. Responsible for global investigations, crisis management, and team leadership.
Lead global Cyber Detect and Respond team at Assa Abloy, ensuring timely incident response and security compliance. Oversee operations while collaborating across IT and business functions for effective threat management.
Lead Cybersecurity Analyst responsible for technical leadership of a 24x7 SOC team at AT&T. Drive operational standards, incident response, and continuous improvement initiatives.
Senior Security Operations Center Analyst protecting computer systems and data through investigation and incident response. Collaborating with IT leaders and mentoring junior analysts in security operations.
Security Operations Engineer creating automations and detection strategies for security infrastructure. Collaborating across teams to enhance security measures and protect organizational assets.
Solution Sales Manager driving revenue growth in Austria and Switzerland's financial sector. Collaborating with teams and managing sales cycles for ServiceNow and Tanium - related services.
Lead SOC Analyst responsible for monitoring and controlling OCLC services. Providing leadership and mentorship while ensuring service delivery and incident management in a hybrid work environment.
Technical Writer supporting Cyber Security Operations Center, documenting processes and workflows for incident response. Collaborating with analysts and engineering teams to create actionable documentation.