We are looking for an experienced SOC / SIEM Analyst to join a long-term cybersecurity project. The role focuses on real-time security monitoring, incident analysis, SIEM optimization, and continuous improvement of the organization’s security posture.
Information Security Access (k/m/*)
Your responsibilities
- Continuously monitor security alerts and events generated by various security tools and systems within the SOC
- Analyze security incidents to determine their severity and potential impact on the organization
- Use advanced analytics and threat detection techniques to identify anomalies and suspicious activities
- Lead the deployment and configuration of Security Information and Event Management (SIEM) solutions
- Fine-tune SIEM rules and alerts to reduce false positives and improve detection accuracy
- Regularly review and update SIEM configurations to address evolving threats and business needs
- Collect, analyze, and distribute threat intelligence from open-source, commercial, and internal sources
- Correlate threat intelligence with security events to enhance incident response
- Stay up to date with current threat trends, vulnerabilities, and attack vectors
- Develop and maintain incident response playbooks for different types of security incidents
- Conduct tabletop exercises and simulations to test and improve response procedures
- Coordinate with cross-functional teams during incidents to ensure effective containment and remediation
- Work closely with IT, network, and application teams to identify security gaps and recommend improvements
- Participate in security assessments, audits, and vulnerability management processes
- Share findings and insights to promote security awareness and proactive risk management
- Prepare detailed incident reports, including root cause analysis and lessons learned
- Present security trends and findings to management and stakeholders
- Create dashboards and visualizations to communicate security metrics and KPIs
Our requirements
- Bachelor’s degree in Computer Science, Information Security, or a related field (or equivalent professional experience)
- Minimum 5 years of experience in SOC / SIEM and cybersecurity
- Strong skills in analyzing security events and threats
- Hands-on experience with SIEM tools such as Splunk, ArcSight, QRadar
- Knowledge of Threat Intelligence platforms and methodologies
- Solid understanding of network security, firewalls, IDS/IPS, and related technologies
- Strong analytical and problem-solving skills
- Team player with good communication skills
- English level: B2 or higher