Match score not available

SOC Operations Analyst

Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

Experience with SIEM platforms, Knowledge of network security monitoring tools, Experience in security and malware analysis, Familiarity with scripting for automation, Understanding of network protocols and logs.

Key responsabilities:

  • Monitor, detect, and respond to threats
  • Develop playbooks and incident response procedures
  • Tune security use cases and create dashboards
  • Integrate threat intelligence and manage vulnerabilities
  • Collaborate for incident escalation and resolution
dinCloud Pakistan logo
dinCloud Pakistan Information Technology & Services SME https://dincloud.com
201 - 500 Employees
See more dinCloud Pakistan offers

Job description

Job Title: Security Operations Analyst

Location: Pakistan Remote

Position Overview:

As a SOC Analyst L1, you will be responsible for monitoring, detecting, and responding to cybersecurity threats and incidents. You will work within the Security Operations Center (SOC) and collaborate with other team members to protect critical systems and data. Your role will include developing playbooks, runbooks, and incident response procedures, as well as tuning security use cases and creating dashboards for monitoring and reporting.

Essential Job Functions:

  • Incident Monitoring & Detection (24x7)
  • Incident Response
  • Use Case Development & Tuning
  • Playbook & Runbook Development
  • Dashboards & Reporting
  • Threat Intelligence Integration:
  • Vulnerability Management
  • Collaboration: Work with internal and external stakeholders for incident escalation, resolution, and communication.

Technical Skills & Tools:

  • Experience with SIEM platforms (e.g., Splunk, IBM QRadar or similar)
  • Knowledge of network security monitoring tools and intrusion detection systems (IDS/IPS)
  • Experience in security analysis and malware analysis.
  • Familiarity with scripting for automation (Python, PowerShell, etc.)
  • Understanding of network protocols, logs, and packet analysis

Preferred Experience:
Candidates with experience in the following technologies and platforms will be preferred:

  • CISCO CSW
  • CISCO XDR
  • CISCO Secure Endpoint
  • CrowdStrike
  • ServiceNow
  • Microsoft Defender
  • CISCO Secure Cloud Analytics
  • Expel
  • Tenable Vulnerability Manager

Required Certifications:

Preferred Certifications (not mandatory but advantageous):

  • GCIH (GIAC Certified Incident Handler)
  • eCIR (Certified Incident Responder)
  • eCTHPv2 (Certified Threat Hunting Professional)
  • OSDA (Offensive Security Defense Analyst)

ATSG is an equal opportunity employer.

Required profile

Experience

Industry :
Information Technology & Services
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Collaboration
  • Communication

Security Operations Center (SOC) Analyst Related jobs