CrawlJobs Logo

Junior SOC Analyst

overturerede.in Logo

Overture Rede

Location Icon

Location:
South Africa , Pretoria

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

We are seeking a Junior SOC Analyst to support Security Operations Center (SOC) activities, including monitoring, detection, analysis, and initial response to security incidents. The ideal candidate will hold one or more recognized cybersecurity certifications and have hands-on experience working with SIEM and security monitoring tools.

Job Responsibility:

  • Monitor security alerts and events using SIEM platforms such as Splunk or Elastic
  • Perform initial analysis and triage of security incidents and suspicious activities
  • Escalate confirmed incidents to senior SOC analysts according to defined procedures
  • Assist in investigating security events related to endpoints, networks, and applications
  • Maintain incident records, reports, and SOC documentation
  • Support threat intelligence ingestion and basic threat hunting activities
  • Follow SOC playbooks and contribute to continuous improvement of SOC processes
  • Support compliance and audit-related security monitoring requirements

Requirements:

  • Bachelor’s degree in Information Technology, Cybersecurity, or a related field
  • 3–5 years of experience in SOC operations, security monitoring, or IT security support roles
  • One or more of the following certifications: CompTIA Security+ EC-Council Certified SOC Analyst (CSA) CompTIA CySA+ Splunk Core Certified User Elastic Certified Analyst
  • Basic understanding of cybersecurity principles, threats, and incident response
  • Hands-on experience with SIEM tools (Splunk, Elastic Stack)
  • Familiarity with MITRE ATT&CK framework
  • Basic knowledge of networking, operating systems, and log analysis
What we offer:
  • Entry point into cybersecurity
  • High demand role
  • Exposure to enterprise environments

Additional Information:

Job Posted:
January 20, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Junior SOC Analyst

Senior Security Engineer

Truveta is the world’s first health provider led data platform with a vision of ...
Location
Location
United States , Seattle
Salary
Salary:
135000.00 - 180000.00 USD / Year
truveta.com Logo
Truveta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cyber Security, Computer Science, Information Security, Information Systems, or a related field, or equivalent practical experience
  • 5+ years of experience in Security Operations (SOC), Incident Response, or Detection & Response role, with demonstrated ownership of complex security incidents
  • Hands-on experience with Microsoft Sentinel (SIEM) and Microsoft Defender XDR (Defender for Endpoint, Identity, Office 365, Cloud Apps)
  • Proficiency in KQL (Kusto Query Language) for investigations, threat hunting, and detection engineering
  • Experience designing, tuning, and maintaining SIEM detections and SOAR automation, including alert triage and response workflows
  • Solid understanding of Azure cloud architecture, core services, and native security controls
  • Familiarity with Azure Entra ID, identity security concepts, RBAC, and IAM-related threats
  • Experience with handing high-severity security incidents, including cross-team coordination and stakeholder communication
  • Familiarity with MITRE ATT&CK, threat actor techniques, and modern attack methodologies across cloud, identity, and endpoint environments
  • Experience supporting on-call rotations and working in a 24/7 or follow-the-sun SOC environment
Job Responsibility
Job Responsibility
  • Incident Response: Handle investigation and response to security incidents across endpoints, identities, email, cloud workloads, and SaaS applications
  • Act as a senior escalation point for SOC analysts during complex or ambiguous security events
  • Participate in on-call rotations and provide senior-level escalation support when needed
  • Lead or contribute to post-incident reviews (RCA, postmortems) and track remediation actions to completion
  • Ensure incidents are accurately documented for audit, compliance, and operational learning
  • Maintain and improve incident response runbooks, playbooks, and escalation procedures
  • Support incident readiness activities, including tabletop exercises and response drills
  • Detection Engineering & Automation: Develop, tune, and maintain Microsoft Sentinel analytics rules to improve detection quality and reduce false positives
  • Design and optimize KQL queries for investigations, threat hunting, and detection engineering
  • Integrate and maintain log sources and data connectors in Microsoft Sentinel, ensuring data quality and proper normalization
What we offer
What we offer
  • Interesting and meaningful work for every career stage
  • Great benefits package
  • Comprehensive benefits with strong medical, dental and vision insurance plans
  • 401K plan
  • Professional development & training opportunities for continuous learning
  • Work/life autonomy via flexible work hours and flexible paid time off
  • Generous parental leave
  • Regular team activities (virtual and in-person)
  • Fulltime
Read More
Arrow Right

Senior SOC Analyst

We are seeking a Senior SOC Analyst to lead advanced security monitoring, incide...
Location
Location
South Africa , South Africa
Salary
Salary:
Not provided
overturerede.in Logo
Overture Rede
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cybersecurity, Information Technology, or a related field
  • 3–5 years of experience in SOC operations, incident response, or advanced security monitoring roles
  • One or more of the following advanced certifications: GIAC GCFA (Forensic Analyst) or GNFA (Network Forensics Analyst) GIAC GCTI (Cyber Threat Intelligence) GIAC GSOC (Security Operations Certified) CREST Registered Intrusion Analyst (CRIA) Advanced tool/vendor certifications (e.g., Splunk Enterprise Security Admin, Elastic Security Specialist)
  • Strong expertise in digital forensics, incident handling, and threat intelligence
  • Advanced knowledge of MITRE ATT&CK and threat actor TTPs
  • Proficiency in SIEM query languages (SPL, KQL, Lucene)
  • Experience working in 24×7 enterprise or MSSP SOC environments
  • Strong reporting, documentation, and stakeholder communication skills
Job Responsibility
Job Responsibility
  • Lead advanced incident response activities, including containment, eradication, and recovery
  • Perform digital and network forensic investigations to support incident analysis
  • Conduct proactive threat hunting and advanced detection engineering
  • Analyze threat intelligence and correlate with internal security events
  • Design, tune, and optimize SIEM and SOAR use cases and detection rules
  • Serve as an escalation point for complex security incidents
  • Provide mentorship and technical leadership to junior and intermediate SOC analysts
  • Develop SOC playbooks, procedures, and post-incident reports
  • Collaborate with security architecture and risk teams to improve security posture
What we offer
What we offer
  • Higher responsibility than junior role
  • Career growth opportunity
  • Strong job security
  • Fulltime
Read More
Arrow Right

Senior SOC Analyst

We are working with a leading UK IT solutions and managed services provider that...
Location
Location
United Kingdom
Salary
Salary:
50000.00 GBP / Year
dynamicsearch.co.uk Logo
Dynamic Search Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong background in SOC operations, digital forensics, incident response or threat detection
  • Experience leading complex security investigations and responding to high severity incidents
  • Advanced experience working with SIEM platforms, ideally Microsoft Sentinel and Defender XDR
  • Strong KQL knowledge for threat hunting and detection development
  • Experience using scripting languages such as Python or PowerShell for automation
  • Familiarity with digital forensics and investigation tools such as Velociraptor, KAPE or sandbox environments
  • Excellent written and verbal communication skills with the ability to present technical findings clearly
  • Comfortable mentoring junior team members and contributing to team development
Job Responsibility
Job Responsibility
  • Incident Response & Forensics: Lead complex security incidents from detection to remediation, coordinate containment, analyse attacker activity, and support client decision-making during high-severity events
  • Threat Hunting & Detection Engineering: Proactively hunt for threats using advanced KQL analytics, tune SIEM/EDR detections, and develop signatures aligned with MITRE ATT&CK
  • Malware Analysis & Reverse Engineering: Perform malware triage and behavioural analysis, using reverse-engineering tools when required
  • Client Reporting & Communication: Produce clear, high-quality investigation reports, timelines, and intelligence summaries for both technical and non-technical audiences
  • SOC Leadership & Continuous Improvement: Contribute to SOC playbooks, mentor junior analysts, support onboarding of new clients, and enhance processes and tooling
  • On-Call Support: Participate in the 24×7 on-call rota to provide expert support during critical incidents
What we offer
What we offer
  • Fully remote working across the UK
  • Competitive salary with additional benefits depending on experience
  • Opportunity to work within a mature and well supported Security Operations environment
  • Ongoing professional development and training opportunities
  • Exposure to a wide range of client environments and security challenges
  • Supportive culture with a strong focus on collaboration and continuous improvement
  • Fulltime
Read More
Arrow Right

Senior SOC Analyst

Brunswick is in search of a Senior Security Operations Center (SOC) Analyst to j...
Location
Location
United States , Mettawa
Salary
Salary:
87800.00 - 128750.00 USD / Year
herbrucks.com Logo
Herbruck Poultry Ranch
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in cybersecurity, computer science, engineering, or related field
  • Five plus years of experience in SOC monitoring, incident response, or related fields
  • Certifications in Information Security and related disciplines are a plus
  • Demonstrated technical understanding in emerging cybersecurity threats
  • Ability to create detections aligning with the MITRE ATT&CK framework
  • Expertise in SOAR, SIEM, threat intelligence, identity management, and endpoint detection and response tools
  • Strong understanding of threats, vulnerabilities, and incident response principles
  • Excellent judgment and ability to make quick decisions in complex situations
  • Perform tasks independently and work within a fast-paced environment
  • Exceptional written and verbal communication skills across varying levels of the organization
Job Responsibility
Job Responsibility
  • Serve as a subject matter expert for a team of analysts dedicated to monitoring and responding
  • Respond to and investigate cybersecurity incidents, including those that occur off-hours as part of a scheduled on-call rotation
  • Serve as a mentor and escalation point for junior SOC analysts, assisting with day-to-day SOC requirements
  • Identify strengths and areas for improvement within the team to improve skills and knowledgebase
  • Stay current with cybersecurity threats, AI developments, risks, and vulnerabilities that could impact services
  • Create detections aligned with the MITRE ATT&CK framework and recommend improvements to leadership
  • Refine and maintain playbooks, procedures, and guidelines that align with industry best practices
  • Maintain strong partnerships with security engineering, incident response, and IT teams to improve monitoring, workflow, and response capabilities
  • Document and share information with team members to help improve analytical skills
  • Support monitoring and response metrics, KPIs, and service level objectives for security events and incidents
What we offer
What we offer
  • annual discretionary bonus
  • medical
  • dental
  • vision
  • paid vacation
  • 401k (up to 4% match)
  • Health Savings Account (with company contribution)
  • well-being program
  • product purchase discounts
  • Fulltime
Read More
Arrow Right

Sr SOC Analyst

Apex Systems is currently hiring for a Sr SOC Analyst with one of our large Bank...
Location
Location
United States , Chandler
Salary
Salary:
53.60 - 56.60 USD / Hour
apexsystems.com Logo
Apex Systems
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience SOC experience
  • Any EDR - Crowdstrike is a huge plus
  • Any SIEM/SOAR - Splunk with SPL and Google Security Operations SIEM are preferred/plus
  • Network analysis - Netwitness (primary) and Wireshark
  • File analysis - Splunk Attack Analyst (Twinwave)
  • Case Management - tool agnostic, but Palo Alto XSOAR is a plus
  • Good communication skills – will need to work with peer teams onshore and offshore
  • Passionate about cybersecurity
Job Responsibility
Job Responsibility
  • Working tickets out of the queue – XSOAR and Splunk
  • Mentor and upskill junior analysts
What we offer
What we offer
  • Medical, dental, vision, life, disability, and other insurance plans
  • ESPP (employee stock purchase program)
  • 401K program with company match after 12 months
  • HSA (Health Savings Account on the HDHP plan)
  • SupportLinc Employee Assistance Program (EAP) with up to 8 free counseling sessions
  • Corporate discount savings program
  • On-demand training program
  • Access to certification prep and a library of technical and leadership courses/books/seminars after 6+ months
  • Certification discounts and other perks to associations (CompTIA, IIBA)
  • Dedicated customer service team
  • Fulltime
Read More
Arrow Right

Security Engineer

As a SOC Engineer at NTT DATA, you will play a crucial role in defending clients...
Location
Location
United Kingdom , Birmingham
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven hands-on experience with SIEM platforms such as Splunk, QRadar, Sentinel, Microsoft Defender, or Chronicle
  • Expertise with SIEM query languages (e.g., KQL, SPL, AQL) and strong knowledge of log normalization and parsing
  • Proficiency in scripting (e.g., Python, PowerShell) to automate tasks and build SOC efficiencies
  • Deep familiarity with cyber threat detection techniques related to frameworks like MITRE ATT&CK and vulnerability management
  • Experience managing ITIL processes, including Incident, Problem, and Change Management
  • CISSP, GIAC, SC-200, Splunk Power User/Admin, QRadar Specialist, or Chronicle Security Engineer certifications preferred
  • Candidates must be eligible to obtain UK SC clearance
  • Strong analytical and communication skills to present complex information to technical and non-technical stakeholders
  • Experienced in collaborative team dynamics and independent problem-solving
  • Proven ability to transfer knowledge and mentor junior SOC team members effectively
Job Responsibility
Job Responsibility
  • Deploy, configure, and maintain SIEM platforms such as Splunk, QRadar, Sentinel, and Chronicle to enable robust threat detection
  • Normalize and onboard diverse log sources from cloud and on-premises environments for seamless monitoring
  • Develop and continually refine SIEM rules and queries for use cases involving advanced threat behaviors and anomaly detection
  • Design and implement incident response playbooks for threats such as phishing, lateral movement, malware infections, and more
  • Integrate response automation into SOAR platforms (e.g., XSOAR, Azure Logic Apps), reducing response times and manual overhead
  • Use feedback from simulated incidents and threat intelligence to refine existing playbooks and workflows
  • Monitor security alerts for potential threats, investigate incidents, and coordinate cross-team response activities
  • Collaborate with threat intelligence teams to enhance detection logic and fine-tune resolution processes
  • Perform root-cause analysis (RCA) of recurring incidents and help define corrective actions to reduce future risks
  • Perform threat modeling using industry frameworks such as MITRE ATT&CK, STRIDE, or the Cyber Kill Chain
What we offer
What we offer
  • We offer a range of tailored benefits that support your physical, emotional, and financial wellbeing
  • Our Learning and Development team ensure that there are continuous growth and development opportunities for our people
  • We also offer the opportunity to have flexible work options
Read More
Arrow Right

Senior Analyst, Security Operations Center

The Senior Analyst, Security Operations Center (SOC) is a technical leader respo...
Location
Location
United States , Charlotte
Salary
Salary:
Not provided
brightspeed.com Logo
Brightspeed
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Associate's degree in Computer Science, Information Systems, Engineering, Technology, or related field or equivalent experience/training
  • Experience managing cases/incidents
  • Ability to think analytically
  • Robust creativity and problem-solving skills
  • Knowledge of technical systems and terminology
  • Proficiency in threat management analysis and dissemination
  • Proficiency in scripting languages
  • Advanced written and verbal communication skills
Job Responsibility
Job Responsibility
  • Lead incident response efforts for high-severity and complex security events, serving as the primary technical coordinator during major incidents
  • Act as escalation point for junior analysts, providing technical guidance and decision support in real time
  • Oversee daily SOC operations, including shift management, workload distribution, and quality assurance of investigations
  • Conduct post-incident reviews and facilitate lessons-learned sessions to drive continuous improvement
  • Mentor and train junior analysts to elevate team capabilities and strengthen overall SOC maturity
  • Perform advanced threat analysis, including APT detection, multi-stage attack correlation, and deep analysis of threat actor tactics, techniques, and procedures (TTPs)
  • Lead proactive threat hunting initiatives across cloud, network, identity, and endpoint environments
  • Design and implement advanced detection rules, correlation logic, queries, and dashboards in SIEM and SOAR platforms
  • Develop custom automation playbooks to accelerate investigation, triage, and containment processes
  • Evaluate and recommend enhanced SOC technologies, detection techniques, and analytic capabilities
What we offer
What we offer
  • Competitive compensation
  • Comprehensive benefits
  • Medical, dental, vision, and life insurance
  • Employee assistance program
  • 401K plan with company match
  • Voluntary benefits
  • Fulltime
Read More
Arrow Right

Sr SecOps Engineer/ Consultant

The Senior Security Operations (SecOps) Engineer is a hands-on technical leader ...
Location
Location
United States , Houston
Salary
Salary:
Not provided
bhsg.com Logo
Beacon Hill
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Deep experience with SIEM tools (preferably Microsoft Sentinel)
  • strong incident response expertise
  • solid understanding of OT/ICS security
Job Responsibility
Job Responsibility
  • Advanced threat detection
  • incident response
  • security operations across both IT and OT (including SCADA) environments
  • serving as a key escalation point for complex incidents
  • leading investigations involving network, endpoint, identity, and cloud threats
  • partnering closely with engineering, infrastructure, and compliance teams
  • improving SOC processes
  • tuning detections
  • mentoring junior analysts
  • strengthening overall security posture
  • Fulltime
Read More
Arrow Right