JOB DESCRIPTION
Position Job
Jr. / Sr. SOC Analyst Date: August 14, 2025
Title:
Reports to: Sr. Manager SOC
(Title, not Name)
Sub-
Department: CISO SOC
Department:
1. JOB PURPOSE
Summarize in one statement why the job exists and how it contributes to the overall
mission or objectives of the organization.
Participate in day-to-day SOC operational activities and projects, including security monitoring,
incident handling, incident response. Review the logs, identify gaps and ensure IT assets are
integrated with SIEM solution.
3. KEY RESPONSIBILITIES
Major Activities
1. Participate and monitor Cyber SOC activities against the threats and alerts, maintain incident
report, review incident tickets and escalate to relevant teams.
2. Leading the assets integration with SIEM under (WinCollect, syslog, SNMP & JDBC etc.), after the
discussions with asset owner to understand complete architecture and logging mechanism.
3. Assisting SOC Manager to continuous improvement of processes and workflow to improve alerts
and rules in the incident monitoring systems (SIEM, SOAR, XDR etc.)
4. Serves as a technical escalation point of contact for the analysts, to include assistance with threat
analysis, best practices, incident response and other operational issues.
5. Developing and validating the Use Cases for emerging threats pertaining to the technology
environment.
6. Identify threat vectors through threat hunting and develop use cases for security monitoring with
respect to Cyber Kill Chain and MITRE ATTACK Framework.
Assisting SOC Manager to implement the automated playbooks (authentication failure, malware
7. handling, phishing/spoofed email detection, virus outbreaks) with SOAR to minimize the response
time.
8. Application, Network, OS and Database logs integration with SIEM and event mapping.
9. Assisting to development and implementation of SOC SOP, Logs integration SOP and application
integration SOP.
10. Provide Incident Response (IR) support when analysis confirms actionable incident.
11. SIEM gap analysis and health check reports.
7. SKILLS AND KNOWLEDGE
1
Education
Bachelor’s degree in computer science, Information Systems, Cybersecurity, or related
field (master’s preferred).
Professional certifications in SOC and Cyber Security will be preferred.
Experience
03 to 05 years’ experience in the field of Security Operations Centre (Information Security)
preferably in datacentre services.
Experience engaging with regulators, auditors, and client security teams.
SKILLS & BEHAVIOURS:
Complete knowledge of SOC operations and SOPs and procedures
Always willing to learn and apply new skills.
Understanding of cloud and data centre environments
Understanding of Information systems auditing, monitoring and assessment process
Ability to work in cross-functional teams globally.