Roles & Responsibilities
Job Description – SOC Analyst
Position Overview
We are seeking a SOC Analyst to join our cybersecurity operations team. The ideal candidate will be responsible for monitoring, detecting, investigating, and escalating security threats across our enterprise environment. This role requires strong analytical skills, hands-on technical expertise in SIEM and security platforms, and the ability to collaborate with cross-functional teams to protect the organization from cyber threats.
Key Responsibilities
Monitoring & Detection
- Monitor SIEM tools and other security platforms for suspicious activities.
- Triage security alerts, classifying them by severity and business impact.
- Detect and analyse intrusion attempts, malware, phishing campaigns, and insider threats.
- Stay updated on evolving threat intelligence and adjust detection rules / correlations accordingly.
Incident Response
Investigate alerts to validate true positives and filter false positives.Perform log analysis, packet capture review, and initial forensic triage.Escalate confirmed incidents to Incident Response (IR) with full analysis.Assist in containment, eradication, and recovery during incidents.Document incident handling steps, root cause analysis, and lessons learned.Reporting & Documentation
Produce daily, weekly, and monthly SOC reports for leadership.Maintain and update incident tickets ensuring accurate case documentation.Support compliance audits (e.g., MAS TRM, PCI-DSS, ISO 27001, NIST CSF).Develop and maintain SOC runbooks, SOPs, and incident response playbooks.Continuous Improvement
Tune SIEM rules and correlation logic to reduce false positives.Collaborate with vulnerability management, IAM, and network security teams.Contribute to red team / blue team exercises to improve SOC maturity.Stay informed on emerging threats, MITRE ATT&CK TTPs, and industry best practices.Key Performance Indicators (KPIs)
Mean Time to Detect (MTTD) : Average time to identify security threats.Mean Time to Respond (MTTR) : Average time taken to resolve / contain incidents.Alert Accuracy : Ratio of true positives vs. false positives.Incident Documentation Quality : Completeness and accuracy of case tickets and reports.Compliance Readiness : Audit success rate for security and regulatory requirements.SOC Maturity Contribution : Improvements made in rules tuning, playbooks, and knowledge sharing.Education & Experience
Education
Diploma / Bachelor’s degree in Information Technology, Cybersecurity, or related field.Experience
Minimum : 3 years’ experience as a SOC Analyst or in a similar role.Maximum : 6 years in SOC, security monitoring, or incident response functions.Knowledge & Skills
Hands-on experience with SIEM tools (Splunk, QRadar, Sentinel, ArcSight, etc.).Understanding of network protocols, firewalls, IDS / IPS, and endpoint security.Familiarity with frameworks such as MITRE ATT&CK, NIST CSF, ISO 27001.Knowledge of malware, phishing, insider threat detection, and log analysis.Strong written and verbal communication skills for reporting and escalation.Ability to work under pressure in 24x7 SOC environments (if applicable).Tell employers what skills you have
ArcSight
Security Operations
Analytical Skills
Vulnerability Management
ISO
Root Cause Analysis
Information Technology
ISO 27001
Tuning
Phishing
Audits
Threat Intelligence
Regulatory Requirements
Network Security
Audit