Associate SOC Analyst at NCC Group monitoring security incidents and collaborating with a cybersecurity team. Contributing to the organisation's cybersecurity posture through analysis and threat mitigation.
Responsibilities
Monitor health and security alerts and events from various sources including SIEM systems, IDS/IPS, and other monitoring tools
Conduct initial triage of security incidents to assess their severity and potential impact on the organization
Document and maintain incident details, including initial findings, actions taken, and any relevant evidence
Communicate findings and recommendations clearly and concisely to technical and non-technical audiences
Initiate escalation procedure to counteract potential threats, vulnerabilities and threat actors both internally and externally
Collaborate with other SOC team members, IT staff, and relevant stakeholders to effectively respond to security incidents
Provide customer service that always exceeds our customers’ expectations
Contribute to the creation and maintenance of security documentation, including incident response playbooks, standard operating procedures, and knowledge base articles
Document and conform to processes related to security monitoring procedures
Compilation and review of service focused reporting
Perform other duties as assigned
Requirements
Bachelor’s degree in computer science, Information Security, or related field (or equivalent experience)
Relevant certifications such as CompTIA Network+, Security+
Basic understanding of networking protocols, operating systems, and security technologies
Familiarity with security tools such as SIEM, IDS/IPS, antivirus, and vulnerability scanning tools
Ability to interpret and analyse security logs and events generated by various systems
Flexibility to quickly learn and adapt to new security tools, technologies, and processes
Strong analytical and problem-solving skills
Good communication skills, both written and verbal
Ability to work collaboratively as part of a team
Relevant certifications such as CompTIA CySA+, GCIH, CSA, CEH (desirable)
Hands-on experience with SIEM platforms (e.g., Splunk, ELK Stack, IBM QRadar)
Proficiency with security tools such as IDS/IPS, antivirus, EDR, vulnerability scanning tools
Familiarity with scripting languages (e.g., Python, PowerShell) for automation and analysis tasks
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.
Security Operations Intern responsible for security monitoring at Paddy Power Betfair. Involves data loss prevention investigations and content filtering analysis with a commitment to improving security posture.
SOC Analyst L2 responsible for managing and analyzing security incidents in digital transformation. Contributing directly to the protection of companies and infrastructures.
Senior Manager leading global IT security operations to protect company data and assets at Keenova. Overseeing incident response, monitoring, and cybersecurity capabilities with strategic oversight.
Security Operations Center leader at Woven by Toyota, managing triage and response to security alerts in Japan. Collaborating with global SOCs to ensure 24/7 operations.
GSOC Analyst responsible for security operations at Paramount Studios. Developing workflows, incident response, and risk monitoring in a dynamic team environment.
Security Operations Analyst at Orion Health focusing on monitoring and maintaining security tools while collaborating with teams. Engaging with real - world threats and enhancing operational security processes.