This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Junior SOC Engineer role at NTT DATA involves supporting the operation and maintenance of SOC detection and response capabilities. The position focuses on developing foundational engineering skills in SIEM management, detection use cases, and incident support.
Job Responsibility:
Assist with the deployment, configuration, and ongoing maintenance of SIEM platforms and data feeds
Support onboarding, parsing, and normalisation of log sources across on premises and cloud environments
Contribute to the creation, tuning, and maintenance of SIEM detection rules and correlation searches
Perform basic health checks and troubleshooting of SIEM data ingestion issues
Assist senior engineers and analysts during investigations and incident response activities
Support continuous improvement of detections based on incident findings and threat intelligence
Support integration of playbooks with SOAR platforms
Help update and refine playbooks based on lessons learned and feedback from incidents
Participate in threat modelling activities using frameworks such as MITRE ATT&CK and STRIDE
Assist in translating threat models and attack techniques into SIEM detection use cases
Assist in building SOC dashboards and reports covering alert trends, incidents, and security posture
Maintain documentation for SIEM configurations, detection logic, runbooks, and playbooks
Support preparation of operational and monthly service reports as required
Collaborate with SOC analysts, engineers, IT, and cloud teams to support secure configurations and logging coverage
Requirements:
Hands on experience with SIEM platforms
Understanding of log formats, parsing, and data normalisation
Working knowledge of SIEM query languages such as SPL, KQL, or AQL
Basic scripting ability (Python and/or PowerShell) for automation and enrichment
Understanding of network traffic flows and the ability to recognise normal vs suspicious activity
Familiarity with vulnerability scanning and vulnerability management concepts
Foundational experience with SIEM technologies (e.g. Splunk/QRadar)
Understanding of log data, alert workflows, and basic threat detection concepts
Awareness of common attack techniques and defensive frameworks (e.g. MITRE ATT&CK)
Basic scripting or automation experience (Python, PowerShell – desirable)
Good analytical skills and attention to detail
Clear written and verbal communication skills
Ability to follow defined processes and work effectively with minimal supervision
Strong analytical and problem solving skills
Clear verbal and written communication in English
Ability to work effectively as part of a SOC team with minimal supervision
Willingness to participate in an on call rota as part of 24/7 SOC operations
Experience in IT security, ideally within a SOC or NOC environment
Experience with ITSM tooling
Exposure to cloud platforms such as Microsoft Azure and/or AWS
Proficiency with Microsoft Office tools, particularly Excel and Word