0% found this document useful (0 votes)
5 views2 pages

JD - Soc Analyst - Is Soc

The Jr. / Sr. SOC Analyst position involves participating in daily SOC operations, including security monitoring and incident response, while ensuring IT assets are integrated with the SIEM solution. Key responsibilities include monitoring cyber threats, leading asset integration, assisting in process improvements, and providing incident response support. Candidates should have a bachelor's degree in a relevant field, 3-5 years of SOC experience, and possess knowledge of SOC operations and cloud environments.

Uploaded by

Syeda Fatima
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views2 pages

JD - Soc Analyst - Is Soc

The Jr. / Sr. SOC Analyst position involves participating in daily SOC operations, including security monitoring and incident response, while ensuring IT assets are integrated with the SIEM solution. Key responsibilities include monitoring cyber threats, leading asset integration, assisting in process improvements, and providing incident response support. Candidates should have a bachelor's degree in a relevant field, 3-5 years of SOC experience, and possess knowledge of SOC operations and cloud environments.

Uploaded by

Syeda Fatima
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

JOB DESCRIPTION

Position Job
Jr. / Sr. SOC Analyst Date: August 14, 2025
Title:

Reports to: Sr. Manager SOC


(Title, not Name)
Sub-
Department: CISO SOC
Department:

1. JOB PURPOSE
Summarize in one statement why the job exists and how it contributes to the overall
mission or objectives of the organization.

Participate in day-to-day SOC operational activities and projects, including security monitoring,
incident handling, incident response. Review the logs, identify gaps and ensure IT assets are
integrated with SIEM solution.

3. KEY RESPONSIBILITIES

Major Activities
1. Participate and monitor Cyber SOC activities against the threats and alerts, maintain incident
report, review incident tickets and escalate to relevant teams.
2. Leading the assets integration with SIEM under (WinCollect, syslog, SNMP & JDBC etc.), after the
discussions with asset owner to understand complete architecture and logging mechanism.
3. Assisting SOC Manager to continuous improvement of processes and workflow to improve alerts
and rules in the incident monitoring systems (SIEM, SOAR, XDR etc.)
4. Serves as a technical escalation point of contact for the analysts, to include assistance with threat
analysis, best practices, incident response and other operational issues.
5. Developing and validating the Use Cases for emerging threats pertaining to the technology
environment.
6. Identify threat vectors through threat hunting and develop use cases for security monitoring with
respect to Cyber Kill Chain and MITRE ATTACK Framework.
Assisting SOC Manager to implement the automated playbooks (authentication failure, malware
7. handling, phishing/spoofed email detection, virus outbreaks) with SOAR to minimize the response
time.
8. Application, Network, OS and Database logs integration with SIEM and event mapping.

9. Assisting to development and implementation of SOC SOP, Logs integration SOP and application
integration SOP.
10. Provide Incident Response (IR) support when analysis confirms actionable incident.

11. SIEM gap analysis and health check reports.

7. SKILLS AND KNOWLEDGE

1
Education
 Bachelor’s degree in computer science, Information Systems, Cybersecurity, or related
field (master’s preferred).
 Professional certifications in SOC and Cyber Security will be preferred.
Experience
 03 to 05 years’ experience in the field of Security Operations Centre (Information Security)
preferably in datacentre services.
 Experience engaging with regulators, auditors, and client security teams.

SKILLS & BEHAVIOURS:


 Complete knowledge of SOC operations and SOPs and procedures
 Always willing to learn and apply new skills.
 Understanding of cloud and data centre environments
 Understanding of Information systems auditing, monitoring and assessment process
 Ability to work in cross-functional teams globally.

You might also like