CrawlJobs Logo

Junior SOC Analyst

overturerede.in Logo

Overture Rede

Location Icon

Location:
South Africa , Pretoria

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

We are seeking a Junior SOC Analyst to support Security Operations Center (SOC) activities, including monitoring, detection, analysis, and initial response to security incidents. The ideal candidate will hold one or more recognized cybersecurity certifications and have hands-on experience working with SIEM and security monitoring tools.

Job Responsibility:

  • Monitor security alerts and events using SIEM platforms such as Splunk or Elastic
  • Perform initial analysis and triage of security incidents and suspicious activities
  • Escalate confirmed incidents to senior SOC analysts according to defined procedures
  • Assist in investigating security events related to endpoints, networks, and applications
  • Maintain incident records, reports, and SOC documentation
  • Support threat intelligence ingestion and basic threat hunting activities
  • Follow SOC playbooks and contribute to continuous improvement of SOC processes
  • Support compliance and audit-related security monitoring requirements

Requirements:

  • Bachelor’s degree in Information Technology, Cybersecurity, or a related field
  • 3–5 years of experience in SOC operations, security monitoring, or IT security support roles
  • One or more of the following certifications: CompTIA Security+ EC-Council Certified SOC Analyst (CSA) CompTIA CySA+ Splunk Core Certified User Elastic Certified Analyst
  • Basic understanding of cybersecurity principles, threats, and incident response
  • Hands-on experience with SIEM tools (Splunk, Elastic Stack)
  • Familiarity with MITRE ATT&CK framework
  • Basic knowledge of networking, operating systems, and log analysis
What we offer:
  • Entry point into cybersecurity
  • High demand role
  • Exposure to enterprise environments

Additional Information:

Job Posted:
January 20, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Junior SOC Analyst

Senior Analyst, Security Operations Center

The Senior Analyst, Security Operations Center (SOC) is a technical leader respo...
Location
Location
United States , Charlotte
Salary
Salary:
Not provided
brightspeed.com Logo
Brightspeed
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Associate's degree in Computer Science, Information Systems, Engineering, Technology, or related field or equivalent experience/training
  • Experience managing cases/incidents
  • Ability to think analytically
  • Robust creativity and problem-solving skills
  • Knowledge of technical systems and terminology
  • Proficiency in threat management analysis and dissemination
  • Proficiency in scripting languages
  • Advanced written and verbal communication skills
Job Responsibility
Job Responsibility
  • Lead incident response efforts for high-severity and complex security events, serving as the primary technical coordinator during major incidents
  • Act as escalation point for junior analysts, providing technical guidance and decision support in real time
  • Oversee daily SOC operations, including shift management, workload distribution, and quality assurance of investigations
  • Conduct post-incident reviews and facilitate lessons-learned sessions to drive continuous improvement
  • Mentor and train junior analysts to elevate team capabilities and strengthen overall SOC maturity
  • Perform advanced threat analysis, including APT detection, multi-stage attack correlation, and deep analysis of threat actor tactics, techniques, and procedures (TTPs)
  • Lead proactive threat hunting initiatives across cloud, network, identity, and endpoint environments
  • Design and implement advanced detection rules, correlation logic, queries, and dashboards in SIEM and SOAR platforms
  • Develop custom automation playbooks to accelerate investigation, triage, and containment processes
  • Evaluate and recommend enhanced SOC technologies, detection techniques, and analytic capabilities
What we offer
What we offer
  • Competitive compensation
  • Comprehensive benefits
  • Medical, dental, vision, and life insurance
  • Employee assistance program
  • 401K plan with company match
  • Voluntary benefits
  • Fulltime
Read More
Arrow Right

NIRT SOC Analyst - Junior to Mid Level

We're looking for a Security Operations Analyst to join the National Incident Re...
Location
Location
United States
Salary
Salary:
Not provided
mmcgrp.com Logo
MMC Group LP
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field (preferred), or equivalent hands-on experience (0-2 years post-degree or 6-8 years total without degree)
  • Must be a U.S. Citizen able to obtain and maintain a Public Trust or higher-level security clearance
  • Familiarity with TCP/IP, network packet analysis, and common network protocols
  • Understanding of core IT infrastructure concepts: firewalls, IDS/IPS, endpoint protection, operating systems, databases, and encryption technologies
  • Proficiency with SIEM tools and log aggregation systems for real-time event monitoring
  • Analytical ability to identify anomalies across large, diverse datasets
  • Knowledge of contemporary cyber threats, attacker methodologies, and digital forensics fundamentals
  • Strong written and verbal communication for documenting findings and collaborating with technical peers
  • Ability to work independently while maintaining situational awareness within a team setting
  • Curiosity and drive to continually research and adapt to evolving security challenges
Job Responsibility
Job Responsibility
  • Monitor and analyze system logs, network data, and alerts to detect potential security incidents
  • Perform event triage and escalation, ensuring prompt attention to high-risk or anomalous activity
  • Investigate suspicious behaviors using multiple monitoring platforms and data sources
  • Assess data sets, structured and unstructured, to detect emerging patterns, trends, or indicators of compromise
  • Utilize SIEM and analytics tools to correlate data from various systems and enhance situational awareness
  • Provide timely and detailed documentation of incidents, observations, and resolutions
  • Participate in root-cause analysis to improve defenses and reduce recurring threats
  • Collaborate with internal response teams to coordinate containment and remediation actions
  • Research current security trends, attacker tactics, and emerging threat vectors to stay ahead of the evolving landscape
  • Respond to diverse threat types, including malware infections, phishing attempts, insider risk, denial-of-service attacks, and data exfiltration efforts
What we offer
What we offer
  • Medical, dental, and vision coverage
  • Life and disability insurance
  • Additional voluntary benefits
Read More
Arrow Right

Junior-Mid Cybersecurity Analyst (SOC)

We are looking for a Junior – Mid Cybersecurity Analyst (SOC) with technical cur...
Location
Location
Philippines , Manila
Salary
Salary:
Not provided
moneyme.com.au Logo
MONEYME
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 3 years of experience in security operations, alert monitoring and incident response
  • Demonstrated hands-on experience with core cybersecurity domains including but not limited to Network Security, Threat Intelligence, Vulnerability validation and remediation tracking, Security awareness and training support
  • Familiarity with enterprise security tools such as SIEM, EDR and cloud security platforms
  • Strong understanding of cloud technologies, cloud networking concepts and cloud security, particularly in Microsoft Azure environments
  • Relevant certifications such as ISC² CC, Security+, CEH, or Azure security certifications are preferred
Job Responsibility
Job Responsibility
  • Monitor security alerts and incidents using enterprise security tools, perform initial investigation and remediation where applicable and escalate to appropriate teams as needed
  • Conduct proactive threat hunting activities to identify suspicious behavior, hidden threats, and control gaps beyond automated alerts
  • Collaborate with key stakeholders to ensure timely resolution of security incidents and identified vulnerabilities
  • Perform security engineering tasks, including alert tuning and automation for effective threat detection and response
  • Utilise threat intelligence to enhance defensive measures and keep security alerts, rules and configurations current
  • Create and maintain documentation of Blue Team activities, including incident response procedures, playbooks and lessons learned
  • Perform vulnerability validation and support remediation tracking to address identified security weaknesses
  • Collaborate with the Red Team during purple-team activities and security exercises to validate detections and defensive controls
  • Conduct cybersecurity training sessions for new hires and share cybersecurity tips to foster a security-aware culture among employees
  • Perform other security tasks assigned by the Information Security function
What we offer
What we offer
  • HMO on Day 1 + 1 free dependent
  • 15 days of vacation leaves and 15 days of sick leave
  • 1 birthday leave
  • Health and wellbeing initiatives like weekly sports activities and MONEYME Olympics
  • Fun filled company activities - summer outings, team building, team lunch or dinner, Halloween event, year-end party and so much more!
  • Complimentary snacks in the office
  • MONEYME Merchandise - hoodie, T-shirt, tumbler, notebook, and id lace
  • Quarterly champion awards & reward trips
Read More
Arrow Right

Senior Cybersecurity Analyst, Threat Hunter

Our cybersecurity and information security teams at IDEXX contribute to a more r...
Location
Location
United States , Westbrook, Maine
Salary
Salary:
120000.00 - 140000.00 USD / Year
idexx.com Logo
IDEXX
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 6–10 years of experience in cybersecurity roles
  • Minimum of 3 years dedicated specifically to threat hunting or advanced incident response
  • Bachelor’s degree in computer science, Cybersecurity, Information Technology, or a related field
  • Preferred certifications GCIH (GIAC Certified Incident Handler) and CompTIA CySA+ (Cybersecurity Analyst+) certification
  • Proven, hands-on experience using platform for EDR (Endpoint Detection and Response) and threat hunting
  • Expert-level knowledge of PowerShell Scripting, Python and EDR and SIEM query language is preferred
  • Deep understanding of incident response lifecycles, methodologies, and forensic techniques
  • Strong knowledge of networking protocols, operating systems (Windows, Linux, macOS), and common attack vectors
  • Familiarity with scripting languages (e.g., Python, PowerShell) for automation of hunting tasks is a plus
  • Exceptional analytical and problem-solving skills with keen attention to detail
Job Responsibility
Job Responsibility
  • Proactively hunt for indicators of compromise (IOCs) and advanced persistent threats (APTs) across the network, endpoints, and cloud environments using threat intelligence and a hypothesis-driven methodology
  • Conduct in-depth analysis of security events, network traffic, and endpoint data to identify malicious activity and potential breaches
  • Utilize the SIEM and EDR platform extensively, applying expert knowledge of the scripting, SIEM and EDR query language to perform complex searches and data analysis
  • Lead and participate in incident response activities, including containment, eradication, and recovery efforts, serving as a primary escalation point for critical security incidents
  • Develop and refine threat hunting playbooks, procedures, and detection rules to improve the security team’s efficiency and effectiveness
  • Collaborate with the security engineering and security operations center (SOC) teams to integrate new threat intelligence and enhance existing security tools and controls
  • Mentor junior analysts and contribute to the ongoing improvement of the organization's overall security posture
What we offer
What we offer
  • Opportunity for annual cash bonus
  • Health / Dental / Vision Benefits Day-One
  • 5% matching 401k
  • Additional benefits including but not limited to financial support, pet insurance, mental health resources, volunteer paid days off, employee stock program, foundation donation matching
  • Fulltime
Read More
Arrow Right

Lead SIEM Engineer

Are you ready to take the lead in shaping one of the most advanced SIEM environm...
Location
Location
United Kingdom , Farnborough
Salary
Salary:
70000.00 - 75000.00 GBP / Year
thepeoplenetwork.co.uk Logo
Fynity
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong hands-on experience leading SIEM engineering projects using platforms such as Splunk, Sentinel or QRadar
  • A deep understanding of cybersecurity frameworks and best practice (NIST, ISO, CIS, PCI DSS)
  • Scripting ability in Python, PowerShell and Regex for tuning and automation
  • Excellent communication skills and the ability to collaborate across teams and projects
  • DV Clearance must be eligible and willing to obtain
Job Responsibility
Job Responsibility
  • Leading the design, development and tuning of SIEM content – rules, dashboards, alerts and reports that spot threats fast
  • Acting as the technical authority on SIEM engineering, ensuring the platform runs efficiently and delivers real value
  • Working with SOC Analysts, Threat Hunters and Architects to enhance SIEM use cases and boost detection accuracy
  • Bringing new ideas and threat intelligence to evolve the SIEM strategy and stay ahead of emerging risks
  • Mentoring junior engineers, setting standards, and helping shape the future of SIEM operations
  • Fulltime
Read More
Arrow Right
New

Information Security Specialist/Analyst III

The Information Security Specialist/Analyst III reports to the Manager, Security...
Location
Location
United States
Salary
Salary:
Not provided
muschealth.org Logo
MUSC Health
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in information security, information assurance, computer science, or a related field with 5 years of IT security experience
  • or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience
  • or a Master's degree in information security, information assurance, computer science, or a related field, and 3 years of IT security experience required
  • Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.)
  • Strong analytical and problem-solving skills with the ability to make decisions under pressure
  • Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools
  • Familiarity with cloud security (Azure, AWS) and identity management solutions
  • Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices
  • Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language
  • Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks
Job Responsibility
Job Responsibility
  • Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure
  • Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches
  • Perform cyber security incident handling, tracking and reporting
  • Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts
  • Respond to relevant service requests received from end users (e.g. for investigation of security events)
  • Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents
  • Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities
  • Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements
  • Conduct vulnerability assessments to identify security risks and report findings to system owners
  • Manage workflows to ensure that protected assets are properly assessed in a timely manner
  • Fulltime
Read More
Arrow Right
New

Senior Incident Response Analyst

Wrike is seeking an experienced Senior Incident Response Analyst to help safegua...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
klaxoon.com Logo
Klaxoon
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Over 5 years of experience in a Senior Incident Response Analyst/SOC/Cybersecurity or similar security-focused role in a software product company
  • Deep understanding of network fundamentals and a wide range of security threats
  • Exceptional analytical and problem-solving skills, with the ability to think critically under pressure
  • Outstanding communication skills, both written and verbal, with the ability to convey complex concepts to technical and non-technical audiences
  • Hands-on experience with leading security information event management (SIEM) and extended detection and response (XDR) platforms (e.g., Rapid7, Splunk, Wazuh, Microsoft Defender for Endpoint, Crowdstrike)
  • Strong experience in log analysis, event correlation, and incident response
Job Responsibility
Job Responsibility
  • Lead the monitoring, analysis, and triage of complex security alerts and events, providing expert guidance to junior team members
  • Assess risk and impact of potential incidents, recommending and overseeing appropriate remediation actions
  • Employ a broad range of advanced security tools and technologies to proactively detect and investigate sophisticated cyber threats
  • Collaborate with and mentor other teams, including incident responders, to ensure timely and accurate escalation and resolution of high-priority cases
  • Oversee documentation and reporting of security incidents, ensuring accuracy, clarity, and timely delivery to relevant stakeholders
  • Drive the ongoing development and enhancement of security monitoring and detection capabilities, introducing best practices and automation where appropriate
  • Stay ahead of the latest security trends, emerging vulnerabilities, and best practices, sharing knowledge and recommendations within the team and across the organization
  • Demonstrated experience functioning at an L3 level, serving as the final escalation point for resolving complex security incidents and issues
  • Mentorship of junior/mid senior analysts, ability to share knowledge
What we offer
What we offer
  • 18 calendar days of paid vacation (12 days of National & Festival holidays (10 fixed, 2 flexible))
  • Sick Leave Compensation (5 Paid Uncertified Sick Days)
  • Menstrual Leave: Twelve (12) days per calendar year. Women employees are eligible for up to 1 day of menstrual leave per month.
  • Parental Leave: 26 Weeks Maternity / 4 Week Paternity
  • 2 Volunteer Days
  • Group Medical Insurance (Employees + Dependents)
  • Term Life Insurance (Rs 50,00,000)
  • Personal Accident Insurance (Rs 50,00,000)
  • Monthly Broadband / Internet Reimbursement (INR 1500)
  • Hybrid Working Model + Complimentary Lunch & Snacks
  • Fulltime
Read More
Arrow Right
New

Software Architect - Fullstack

We are looking for a Senior/Software Architect with a strong full-stack backgrou...
Location
Location
Pakistan , Lahore; Karachi; Islamabad
Salary
Salary:
Not provided
10pearls.com Logo
10Pearls
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's or master's in computer science, Engineering, or related field
  • 10+ years in full-stack software development and architecture
  • 3+ years as a Technical Lead or Software Architect
  • Frontend: Angular, React
  • Backend: .NET Core, Java Spring Boot, Node.js (Express/NestJS), Python
  • Experienced in building end-to-end solutions using full-stack combinations such as MERN and MEAN
  • Cloud Platforms: AWS, Azure, GCP, or OpenShift
  • Strong object-oriented design and system architecture knowledge
  • Solid experience with n-tier web applications and enterprise application architecture
  • Experience with DevOps tools, CI/CD pipelines, and version control systems
Job Responsibility
Job Responsibility
  • Design and develop scalable, secure, and maintainable software architectures that meet business requirements
  • Lead technical design and guide development teams through implementation with a focus on performance, reliability, and security
  • Collaborate with cross-functional teams to align technology with business goals, ensuring the architecture supports scalability and client objectives
  • Conduct code and design reviews to ensure the integrity of architectural solutions and best practices, including CI/CD pipelines and secure coding
  • Lead adoption of emerging technologies, including cloud services and AI/GenAI tools, to enhance system capabilities where applicable
  • Identify technical risks early in the project lifecycle and design strategies to mitigate them, ensuring robust system architecture
  • Embrace a consulting mindset by understanding client needs, proposing innovative technical solutions that deliver business value, and translating complex technical concepts to non-technical stakeholders
  • Mentor junior architects and engineers, providing technical guidance and promoting a culture of continuous improvement
  • Engage in client discussions to gather requirements, offer technical advice, and present solutions that align with business goals and deliver measurable impact
  • Guide the recruitment of technical talent, ensuring that new hires meet both technical and cultural standards
Read More
Arrow Right