CrawlJobs Logo

Junior SOC Analyst

overturerede.in Logo

Overture Rede

Location Icon

Location:
South Africa , Pretoria

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

We are seeking a Junior SOC Analyst to support Security Operations Center (SOC) activities, including monitoring, detection, analysis, and initial response to security incidents. The ideal candidate will hold one or more recognized cybersecurity certifications and have hands-on experience working with SIEM and security monitoring tools.

Job Responsibility:

  • Monitor security alerts and events using SIEM platforms such as Splunk or Elastic
  • Perform initial analysis and triage of security incidents and suspicious activities
  • Escalate confirmed incidents to senior SOC analysts according to defined procedures
  • Assist in investigating security events related to endpoints, networks, and applications
  • Maintain incident records, reports, and SOC documentation
  • Support threat intelligence ingestion and basic threat hunting activities
  • Follow SOC playbooks and contribute to continuous improvement of SOC processes
  • Support compliance and audit-related security monitoring requirements

Requirements:

  • Bachelor’s degree in Information Technology, Cybersecurity, or a related field
  • 3–5 years of experience in SOC operations, security monitoring, or IT security support roles
  • One or more of the following certifications: CompTIA Security+ EC-Council Certified SOC Analyst (CSA) CompTIA CySA+ Splunk Core Certified User Elastic Certified Analyst
  • Basic understanding of cybersecurity principles, threats, and incident response
  • Hands-on experience with SIEM tools (Splunk, Elastic Stack)
  • Familiarity with MITRE ATT&CK framework
  • Basic knowledge of networking, operating systems, and log analysis
What we offer:
  • Entry point into cybersecurity
  • High demand role
  • Exposure to enterprise environments

Additional Information:

Job Posted:
January 20, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Junior SOC Analyst

Senior Security Engineer

Truveta is the world’s first health provider led data platform with a vision of ...
Location
Location
United States , Seattle
Salary
Salary:
135000.00 - 180000.00 USD / Year
truveta.com Logo
Truveta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cyber Security, Computer Science, Information Security, Information Systems, or a related field, or equivalent practical experience
  • 5+ years of experience in Security Operations (SOC), Incident Response, or Detection & Response role, with demonstrated ownership of complex security incidents
  • Hands-on experience with Microsoft Sentinel (SIEM) and Microsoft Defender XDR (Defender for Endpoint, Identity, Office 365, Cloud Apps)
  • Proficiency in KQL (Kusto Query Language) for investigations, threat hunting, and detection engineering
  • Experience designing, tuning, and maintaining SIEM detections and SOAR automation, including alert triage and response workflows
  • Solid understanding of Azure cloud architecture, core services, and native security controls
  • Familiarity with Azure Entra ID, identity security concepts, RBAC, and IAM-related threats
  • Experience with handing high-severity security incidents, including cross-team coordination and stakeholder communication
  • Familiarity with MITRE ATT&CK, threat actor techniques, and modern attack methodologies across cloud, identity, and endpoint environments
  • Experience supporting on-call rotations and working in a 24/7 or follow-the-sun SOC environment
Job Responsibility
Job Responsibility
  • Incident Response: Handle investigation and response to security incidents across endpoints, identities, email, cloud workloads, and SaaS applications
  • Act as a senior escalation point for SOC analysts during complex or ambiguous security events
  • Participate in on-call rotations and provide senior-level escalation support when needed
  • Lead or contribute to post-incident reviews (RCA, postmortems) and track remediation actions to completion
  • Ensure incidents are accurately documented for audit, compliance, and operational learning
  • Maintain and improve incident response runbooks, playbooks, and escalation procedures
  • Support incident readiness activities, including tabletop exercises and response drills
  • Detection Engineering & Automation: Develop, tune, and maintain Microsoft Sentinel analytics rules to improve detection quality and reduce false positives
  • Design and optimize KQL queries for investigations, threat hunting, and detection engineering
  • Integrate and maintain log sources and data connectors in Microsoft Sentinel, ensuring data quality and proper normalization
What we offer
What we offer
  • Interesting and meaningful work for every career stage
  • Great benefits package
  • Comprehensive benefits with strong medical, dental and vision insurance plans
  • 401K plan
  • Professional development & training opportunities for continuous learning
  • Work/life autonomy via flexible work hours and flexible paid time off
  • Generous parental leave
  • Regular team activities (virtual and in-person)
  • Fulltime
Read More
Arrow Right

Senior SOC Analyst

We are seeking a Senior SOC Analyst to lead advanced security monitoring, incide...
Location
Location
South Africa , South Africa
Salary
Salary:
Not provided
overturerede.in Logo
Overture Rede
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cybersecurity, Information Technology, or a related field
  • 3–5 years of experience in SOC operations, incident response, or advanced security monitoring roles
  • One or more of the following advanced certifications: GIAC GCFA (Forensic Analyst) or GNFA (Network Forensics Analyst) GIAC GCTI (Cyber Threat Intelligence) GIAC GSOC (Security Operations Certified) CREST Registered Intrusion Analyst (CRIA) Advanced tool/vendor certifications (e.g., Splunk Enterprise Security Admin, Elastic Security Specialist)
  • Strong expertise in digital forensics, incident handling, and threat intelligence
  • Advanced knowledge of MITRE ATT&CK and threat actor TTPs
  • Proficiency in SIEM query languages (SPL, KQL, Lucene)
  • Experience working in 24×7 enterprise or MSSP SOC environments
  • Strong reporting, documentation, and stakeholder communication skills
Job Responsibility
Job Responsibility
  • Lead advanced incident response activities, including containment, eradication, and recovery
  • Perform digital and network forensic investigations to support incident analysis
  • Conduct proactive threat hunting and advanced detection engineering
  • Analyze threat intelligence and correlate with internal security events
  • Design, tune, and optimize SIEM and SOAR use cases and detection rules
  • Serve as an escalation point for complex security incidents
  • Provide mentorship and technical leadership to junior and intermediate SOC analysts
  • Develop SOC playbooks, procedures, and post-incident reports
  • Collaborate with security architecture and risk teams to improve security posture
What we offer
What we offer
  • Higher responsibility than junior role
  • Career growth opportunity
  • Strong job security
  • Fulltime
Read More
Arrow Right

Senior SOC Analyst

Brunswick is in search of a Senior Security Operations Center (SOC) Analyst to j...
Location
Location
United States , Mettawa
Salary
Salary:
87800.00 - 128750.00 USD / Year
herbrucks.com Logo
Herbruck Poultry Ranch
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in cybersecurity, computer science, engineering, or related field
  • Five plus years of experience in SOC monitoring, incident response, or related fields
  • Certifications in Information Security and related disciplines are a plus
  • Demonstrated technical understanding in emerging cybersecurity threats
  • Ability to create detections aligning with the MITRE ATT&CK framework
  • Expertise in SOAR, SIEM, threat intelligence, identity management, and endpoint detection and response tools
  • Strong understanding of threats, vulnerabilities, and incident response principles
  • Excellent judgment and ability to make quick decisions in complex situations
  • Perform tasks independently and work within a fast-paced environment
  • Exceptional written and verbal communication skills across varying levels of the organization
Job Responsibility
Job Responsibility
  • Serve as a subject matter expert for a team of analysts dedicated to monitoring and responding
  • Respond to and investigate cybersecurity incidents, including those that occur off-hours as part of a scheduled on-call rotation
  • Serve as a mentor and escalation point for junior SOC analysts, assisting with day-to-day SOC requirements
  • Identify strengths and areas for improvement within the team to improve skills and knowledgebase
  • Stay current with cybersecurity threats, AI developments, risks, and vulnerabilities that could impact services
  • Create detections aligned with the MITRE ATT&CK framework and recommend improvements to leadership
  • Refine and maintain playbooks, procedures, and guidelines that align with industry best practices
  • Maintain strong partnerships with security engineering, incident response, and IT teams to improve monitoring, workflow, and response capabilities
  • Document and share information with team members to help improve analytical skills
  • Support monitoring and response metrics, KPIs, and service level objectives for security events and incidents
What we offer
What we offer
  • annual discretionary bonus
  • medical
  • dental
  • vision
  • paid vacation
  • 401k (up to 4% match)
  • Health Savings Account (with company contribution)
  • well-being program
  • product purchase discounts
  • Fulltime
Read More
Arrow Right

Sr SOC Analyst

Apex Systems is currently hiring for a Sr SOC Analyst with one of our large Bank...
Location
Location
United States , Chandler
Salary
Salary:
53.60 - 56.60 USD / Hour
apexsystems.com Logo
Apex Systems
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience SOC experience
  • Any EDR - Crowdstrike is a huge plus
  • Any SIEM/SOAR - Splunk with SPL and Google Security Operations SIEM are preferred/plus
  • Network analysis - Netwitness (primary) and Wireshark
  • File analysis - Splunk Attack Analyst (Twinwave)
  • Case Management - tool agnostic, but Palo Alto XSOAR is a plus
  • Good communication skills – will need to work with peer teams onshore and offshore
  • Passionate about cybersecurity
Job Responsibility
Job Responsibility
  • Working tickets out of the queue – XSOAR and Splunk
  • Mentor and upskill junior analysts
What we offer
What we offer
  • Medical, dental, vision, life, disability, and other insurance plans
  • ESPP (employee stock purchase program)
  • 401K program with company match after 12 months
  • HSA (Health Savings Account on the HDHP plan)
  • SupportLinc Employee Assistance Program (EAP) with up to 8 free counseling sessions
  • Corporate discount savings program
  • On-demand training program
  • Access to certification prep and a library of technical and leadership courses/books/seminars after 6+ months
  • Certification discounts and other perks to associations (CompTIA, IIBA)
  • Dedicated customer service team
  • Fulltime
Read More
Arrow Right

Engineer III - Cyber Incident Response

The Engineer III, Cyber Incident Response, is a senior technical role within the...
Location
Location
United States , Conshohocken; Remote
Salary
Salary:
Not provided
cencora.com Logo
Cencora
Expiration Date
March 23, 2026
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent work experience
  • Master’s degree preferred
  • Strong knowledge of incident response methodologies, digital forensics, and adversary tactics
  • Familiarity with security frameworks such as NIST, MITRE ATT&CK, and ISO 27035
  • 5–7 years of progressive experience in cybersecurity, with at least 3 years in incident response or SOC operations
  • Hands-on experience with SIEM, EDR, SOAR, and forensic tools (e.g., Splunk, CrowdStrike, EnCase, Wireshark)
  • Proven ability to investigate advanced threats and coordinate response activities across teams
  • Demonstrated success in mentoring junior analysts and improving SOC processes
  • Strong written and verbal communication skills with the ability to document and present technical findings clearly
Job Responsibility
Job Responsibility
  • Lead the investigation and resolution of complex security incidents, including advanced persistent threats, ransomware, phishing campaigns, and insider activities
  • Perform forensic analysis across endpoints, networks, and cloud environments to identify root causes and scope of compromise
  • Develop and enhance incident response playbooks, runbooks, and detection use cases
  • Collaborate with threat intelligence, vulnerability management, and countermeasures teams to strengthen defenses
  • Escalate high-severity incidents to senior leadership and provide clear, actionable reporting
  • Act as a technical escalation point for Engineer I/II analysts during incident investigations
  • Contribute to red team and purple team exercises to validate and improve response capabilities
  • Participate in after-action reviews and lessons-learned sessions to improve SOC processes
  • Mentor and train junior engineers on incident response best practices and investigative techniques
What we offer
What we offer
  • medical
  • dental
  • vision care
  • comprehensive suite of benefits focusing on physical, emotional, financial, and social aspects of wellness
  • support for working families
  • backup dependent care
  • adoption assistance
  • infertility coverage
  • family building support
  • behavioral health solutions
  • Fulltime
Read More
Arrow Right

Senior Analyst, Security Operations Center

The Senior Analyst, Security Operations Center (SOC) is a technical leader respo...
Location
Location
United States , Charlotte
Salary
Salary:
Not provided
brightspeed.com Logo
Brightspeed
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Associate's degree in Computer Science, Information Systems, Engineering, Technology, or related field or equivalent experience/training
  • Experience managing cases/incidents
  • Ability to think analytically
  • Robust creativity and problem-solving skills
  • Knowledge of technical systems and terminology
  • Proficiency in threat management analysis and dissemination
  • Proficiency in scripting languages
  • Advanced written and verbal communication skills
Job Responsibility
Job Responsibility
  • Lead incident response efforts for high-severity and complex security events, serving as the primary technical coordinator during major incidents
  • Act as escalation point for junior analysts, providing technical guidance and decision support in real time
  • Oversee daily SOC operations, including shift management, workload distribution, and quality assurance of investigations
  • Conduct post-incident reviews and facilitate lessons-learned sessions to drive continuous improvement
  • Mentor and train junior analysts to elevate team capabilities and strengthen overall SOC maturity
  • Perform advanced threat analysis, including APT detection, multi-stage attack correlation, and deep analysis of threat actor tactics, techniques, and procedures (TTPs)
  • Lead proactive threat hunting initiatives across cloud, network, identity, and endpoint environments
  • Design and implement advanced detection rules, correlation logic, queries, and dashboards in SIEM and SOAR platforms
  • Develop custom automation playbooks to accelerate investigation, triage, and containment processes
  • Evaluate and recommend enhanced SOC technologies, detection techniques, and analytic capabilities
What we offer
What we offer
  • Competitive compensation
  • Comprehensive benefits
  • Medical, dental, vision, and life insurance
  • Employee assistance program
  • 401K plan with company match
  • Voluntary benefits
  • Fulltime
Read More
Arrow Right
New

SOC Analyst L2

Location
Location
Egypt , Nasr City
Salary
Salary:
Not provided
el-delta.com Logo
El Delta Electronic Systems
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Information Technology, or related field
  • CCNA/CCNP security, Certified Forensic Computer Examiner (CFCE), Certified Information Systems Security Professional (CISSP) with a focus on digital forensics, or other relevant advanced security certifications highly preferred
  • 3+ years of experience in SOC Analyst role
  • Strong understanding of computer operating systems (Windows, Linux, macOS)
  • Experience with digital forensics and analysis tools and software (e.g., EnCase, FTK, Cellebrite)
  • Experience in advanced threat hunting, and incident response
  • Knowledge of common attack vectors (e.g., phishing, malware, ransomware)
  • Understanding of threat intelligence feeds and data sources
  • Experience with security orchestration and automation platforms (SOAR)
Job Responsibility
Job Responsibility
  • Conduct in-depth analysis of security alerts and incidents escalated from L1
  • Utilize advanced threat intelligence and hunting techniques to identify and investigate sophisticated threats
  • Perform malware analysis and reverse engineering techniques
  • Investigate and analyze network traffic for malicious activity
  • Develop, maintain, and enrich threat intelligence feeds, indicators of compromise (IOCs), and other relevant threat-related data
  • Lead and coordinate incident response activities, including containment, eradication, recovery, and root cause analysis
  • Develop and implement security playbooks and response procedures
  • Collaborate with other IT teams to remediate security vulnerabilities and implement security controls
  • Conduct in-depth digital forensic investigations on compromised systems and networks
  • Collect, preserve, and analyze digital evidence according to legal and industry best practices
  • Fulltime
Read More
Arrow Right

NIRT SOC Analyst - Junior to Mid Level

We're looking for a Security Operations Analyst to join the National Incident Re...
Location
Location
United States
Salary
Salary:
Not provided
mmcgrp.com Logo
MMC Group LP
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field (preferred), or equivalent hands-on experience (0-2 years post-degree or 6-8 years total without degree)
  • Must be a U.S. Citizen able to obtain and maintain a Public Trust or higher-level security clearance
  • Familiarity with TCP/IP, network packet analysis, and common network protocols
  • Understanding of core IT infrastructure concepts: firewalls, IDS/IPS, endpoint protection, operating systems, databases, and encryption technologies
  • Proficiency with SIEM tools and log aggregation systems for real-time event monitoring
  • Analytical ability to identify anomalies across large, diverse datasets
  • Knowledge of contemporary cyber threats, attacker methodologies, and digital forensics fundamentals
  • Strong written and verbal communication for documenting findings and collaborating with technical peers
  • Ability to work independently while maintaining situational awareness within a team setting
  • Curiosity and drive to continually research and adapt to evolving security challenges
Job Responsibility
Job Responsibility
  • Monitor and analyze system logs, network data, and alerts to detect potential security incidents
  • Perform event triage and escalation, ensuring prompt attention to high-risk or anomalous activity
  • Investigate suspicious behaviors using multiple monitoring platforms and data sources
  • Assess data sets, structured and unstructured, to detect emerging patterns, trends, or indicators of compromise
  • Utilize SIEM and analytics tools to correlate data from various systems and enhance situational awareness
  • Provide timely and detailed documentation of incidents, observations, and resolutions
  • Participate in root-cause analysis to improve defenses and reduce recurring threats
  • Collaborate with internal response teams to coordinate containment and remediation actions
  • Research current security trends, attacker tactics, and emerging threat vectors to stay ahead of the evolving landscape
  • Respond to diverse threat types, including malware infections, phishing attempts, insider risk, denial-of-service attacks, and data exfiltration efforts
What we offer
What we offer
  • Medical, dental, and vision coverage
  • Life and disability insurance
  • Additional voluntary benefits
Read More
Arrow Right