SOC Analyst

Islamabad, Islamabad Capital Territory, Pakistan

Applications have closed

Inbox Business Technologies

View company page

  1. Security Monitoring and Analysis:
  • Monitor security event and incident detection systems, including ArcSight SIEM, IDS/IPS, and other security appliances for potential security incidents.
  • Analyze security events and alerts to identify potential threats, vulnerabilities, and suspicious activities.
  • Investigate and triage security incidents to determine their severity, impact, and appropriate response actions.
  • Incident Response and Management:
    • Execute incident response procedures according to established protocols and best practices.
    • Coordinate with internal stakeholders and teams to contain, mitigate, and remediate security incidents in a timely manner.
    • Document incident details, investigation findings, and response actions taken for further analysis and reporting.
  • Threat Intelligence and Research:
    • Stay abreast of the latest cybersecurity threats, vulnerabilities, and attack techniques through threat intelligence feeds, research publications, and industry forums.
    • Utilize threat intelligence to enhance security monitoring, detection capabilities, and incident response strategies.
  • Continuous Improvement and Collaboration:
    • Participate in security awareness training and knowledge-sharing sessions to enhance team capabilities and awareness of emerging threats.
    • Collaborate with other members of the cybersecurity team and IT departments to improve security controls, processes, and procedures.
    • Provide recommendations for enhancing security posture and reducing the organization's exposure to cybersecurity risks.

    Requirements

    • Bachelor’s degree in computer science, Information Technology, Cybersecurity, or related field.
    • Minimum of 1-2 years of experience in a cybersecurity-related role, preferably in a SOC environment.
    • Solid understanding of network protocols, operating systems, and security technologies.
    • Familiarity with security information and event management (SIEM) tools, intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions.
    • Proficiency in analyzing security event logs, packet captures, and other forensic data sources.
    • Strong analytical and problem-solving skills with the ability to prioritize and respond to security incidents effectively.
    • Excellent communication skills, both written and verbal, with the ability to convey technical information to non-technical stakeholders.
    • Relevant industry certifications such as Security+, CEH (Certified Ethical Hacker), or GIAC certifications (GSEC, GCIH, GCIA) are a plus.

    * Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

    Tags: ArcSight CEH Computer Science Endpoint security GCIA GCIH GIAC GSEC IDS Incident response Intrusion detection IPS Monitoring SIEM SOC Threat intelligence Vulnerabilities

    Perks/benefits: Team events

    Region: Asia/Pacific
    Country: Pakistan
    Job stats:  39  16  0

    More jobs like this

    Explore more InfoSec / Cybersecurity career opportunities

    Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.