CrawlJobs Logo

SOC Analyst (Level 1)

keyrock.com Logo

Keyrock

Location Icon

Location:

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

As a SOC Analyst (Level 1), you are the first line of defense for monitoring, triaging, and escalating security alerts across Keyrock’s cloud-first, high-availability trading environment. You will follow playbooks/runbooks to validate alerts, enrich investigations with context, and ensure timely escalation to Level 2/Incident Response.

Job Responsibility:

  • 24/7 monitoring and alert triage across SIEM/EDR/cloud security tooling
  • identify false positives vs. credible threats and set appropriate severity
  • Initial investigation and enrichment: gather relevant logs/telemetry, add context, and document findings clearly in the case/ticketing system
  • Escalation and coordination: escalate confirmed/suspected incidents quickly and cleanly to L2/IR with a complete handoff (timeline, scope, IOCs, actions taken)
  • Runbook execution: follow SOPs for common events (phishing, suspicious logins, endpoint detections, cloud key/token risk, malware alerts, data exfiltration signals), including containment actions you’re authorized to perform
  • Threat-aware analysis: map alerts to adversary behaviors (e.g., MITRE ATT&CK techniques) to improve understanding and escalation quality
  • Operational hygiene: maintain accurate shift handovers, update watchlists and investigation notes, and identify recurring alert patterns for tuning recommendations

Requirements:

  • 0–2 years in a SOC / security monitoring / IT operations role (or equivalent hands-on experience, internships, labs)
  • Practical knowledge of security fundamentals: networking, DNS, HTTP(S), identity/authentication, and malware basics
  • Familiarity with log investigation and event triage concepts
  • Familiarity with common security tools and workflows (any of the following): SIEM (Splunk/Elastic/Sentinel), EDR (CrowdStrike/Defender), ticketing (Jira/ServiceNow), basic SOAR concepts
  • Strong written communication: produce clear, escalation-ready tickets and timelines
  • Ability to work rotating shifts/on-call (as required), including weekends/holidays depending on coverage model

Nice to have:

  • Cloud security exposure (AWS/GCP/Azure): CloudTrail/Activity Logs, IAM analysis, detections for token/key misuse
  • Familiarity with incident response frameworks/processes (e.g., NIST incident response guidance)
  • Exposure to detection engineering concepts (rule tuning, false-positive reduction), or basic scripting (Python/Bash) for investigation automation
  • Knowledge of the digital-asset ecosystem (exchanges, custody concepts, operational risk in 24/7 trading environments)
  • Certifications (optional): Security+, Blue Team Level 1, SSCP, or equivalent practical training
What we offer:
  • Work in a fast-moving, globally distributed environment shaping the future of digital financial markets
  • A culture that expects ownership, learning, and continuous improvement

Additional Information:

Job Posted:
February 18, 2026

Employment Type:
Fulltime
Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for SOC Analyst (Level 1)

SOC Level 1 Analyst

Inetum is a European leader in digital services. Inetum’s team of 28,000 consult...
Location
Location
Portugal , Lisbon
Salary
Salary:
Not provided
https://www.inetum.com Logo
Inetum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 1/2 years of experience as a SOC level 1 analyst or similar
  • Experience with MS Windows Azure
  • Strong knowledge of IP networks - Internet Protocol (IPv4, IPv6)
  • Familiarity with DNS - Domain Name System
  • Knowledge of Sentinel is valuable
  • Analytical mindset and attention to detail
  • Enjoy working in a team, proactivity, and results orientation
  • Good level of English
  • Availability to work 24x7 shifts
Job Responsibility
Job Responsibility
  • Monitoring the SIEM platform and other systems that generate vulnerability alerts and security incident events
  • Periodic verification of sources that need to be managed and analysis of security events
  • Identification and notification of security alerts
  • Recording security incidents
  • Performing the first level of incident handling (assessment, triage, identification of actions to be taken, escalation, validation)
  • Verification of effective incident resolution
  • Fulltime
Read More
Arrow Right
New

Incident Response Analyst

In order to support our international Incident Response Team, Airbus Defense and...
Location
Location
Spain , Getafe
Salary
Salary:
Not provided
airbus.com Logo
Airbus
Expiration Date
April 15, 2026
Flip Icon
Requirements
Requirements
  • Educated to degree level in Cyber security, computer science or relevant working experience
  • Certifications of GIAC or comparable
  • Experience and knowledge in the following items are welcome: perform reverse-engineering, Hosts forensic analysis
  • Negotiation level in English
  • This position will require a security clearance or will require being eligible for clearance by the recognized authorities
Job Responsibility
Job Responsibility
  • Investigation of SOC alerts and security incidents
  • Improvement of the threat detection and response capabilities
  • Support the SOC in its daily operations
  • Support incident response in crisis mode: Be part of the on-call crisis team (deployment reactivity constraints)
  • Perform reverse-engineering
  • Hosts forensic analysis
  • Contribute to the industrialization of: Security Tooling
  • Network analysis
  • Host analysis
  • Detection: Use Case development and alerts
What we offer
What we offer
  • Vacation days and additional days-off along the year (+35 days off in total)
  • Attractive salary and compensation package
  • Hybrid model of working when possible, promoting the work-life balance (40% remote work)
  • Collective transport service in some sites
  • Benefits such as health insurance, employee stock options, retirement plan...
  • On-site facilities (among others): free canteen, kindergarten, medical office
  • Possibility to collaborate in different social and corporate social responsibility initiatives
  • Excellent upskilling opportunities and great development prospects in a multicultural environment
  • Special rates in products & benefits
  • Fulltime
Read More
Arrow Right
New

SOC Analyst Senior Cyber Security Engineer

Position: SOC Analyst Senior Cyber Security Engineer. Experience: 2 to 4 yrs. Lo...
Location
Location
India , Noida
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 2-year experience working in security operations environment or 2 years’ experience in IT operations Data Centre, SOC/NOC
  • Very good English verbal & written communication skills
  • Good understanding of networking concepts and operating systems
  • Good understanding of key customer infrastructure components - Proxy, Firewall, Antivirus
  • Technical capability and maturity to assist and guide the team of Analysts
  • Should have worked and have good understanding of the following security tools: (SentinelOne IR, Service Now Tool, Microsoft Defender)
  • Ability to learn new skills and adopting new technologies and work collaboratively in an international context
  • Capability to understand and work in a complex environment and concern for quality and detail
  • Ability to synthesize and analyze a variety of contexts and manage customer confidentiality
  • Knowledge on ITIL basic practice
Job Responsibility
Job Responsibility
  • Ensure all threats at customer environment are detected and notified in timely manner
  • Continuous review of Incidents to ensure compliance with standard operating procedures
  • Provide training and feedback to Security Analysts to ensure high quality deliverables
  • Identify and execute continuous improvements in monitoring including threat scenarios and operating procedures
  • Interact with customers on queries and improvements related to service deliverables
  • Should know and able to contribute to MSSP services (Managed Security Services Provider)
  • Perform root cause analysis for any errors /deficiencies pointed out in the monitoring service
  • Review the alert to determine relevancy and urgency, create new trouble tickets for incident
  • Ensure thorough knowledge of Protection of Personal Identifiable Information and GDPR
Read More
Arrow Right
New

Managed Services Operations Specialist

The Managed Services Operations Specialist is a skilled cybersecurity specialist...
Location
Location
Romania , Bucuresti
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 1 year of experience working in an industry standard SOC in security analysis/incident handling and security monitoring
  • Experience or at least knowledge of Cloud technologies (Azure preferred)
  • Experienced in SIEM (Sentinel, Splunk, QRadar Chronicle, McAfee, CryptoSIM, Logsign etc.) and SOAR products
  • Knowledgeable in security topics such as next gen firewalls (Fortinet, PaloAlto, CheckPoint) and other network security devices and software such as WAF, DLP, anti-virus/anti-malware, threat intelligence, etc.
  • General understanding of attacker tools, tactics and techniques and referencing on MITRE ATT&CK, knowledge of MITRE Shield
  • Familiar with tools for malware analysis, open-source threat Intelligence and SOAR
  • Detail-oriented, problem-solving mindset with critical and analytical thinking
  • Ethical integrity, good at teamwork, responsible and highly motivated
  • Result-oriented, inquisitive, eager to learn new threats, technologies, and security practices
  • Fluent in English to read and interpret global reports and technical articles published in the field of cybersecurity
Job Responsibility
Job Responsibility
  • Monitor security access and identify security incidents using Security Information and Event Management (SIEM) tools
  • Ensure continuity and availability of the modular platform components and security systems required
  • Perform initial analysis and investigation of security alerts to differentiate false positives from true incidents. This includes understanding attack vectors, malware behavior, and the potential impact of different types of threats
  • Document security incidents and actions taken in response
  • Escalate complex incidents to higher-level SOC threat responders and experts for further analysis and resolution, working in partnership with the L2 Central SOC teams and other SOCs
  • Participate in developing incident response protocols and procedures
What we offer
What we offer
  • Hybrid working regime 2 days from the office, 3 days remote
  • Special discounts for Vodafone employees, Friends & Family offers
  • Demo telephone subscription - unlimited (voice and data)
  • Voucher for the purchase of a mobile phone
  • Medical subscription to a top private clinic & other medical benefits
  • Insurance for hospitalization and surgical interventions
  • Life insurance
  • Meal tickets
  • Bookster subscription
  • Participation in development programs and challenging projects in the leadership area
  • Fulltime
Read More
Arrow Right

Lead Technology Risk Analyst

Lead and/or support customers’, regulators, technology and security examinations...
Location
Location
Norway , Oslo
Salary
Salary:
Not provided
mastercard.com Logo
Mastercard
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Master’s degree in law, finance, business management or IT related field
  • Experience in IT, Banking, Payment or FinTech sectors in similar role (Stakeholder Assurance, Compliance)
  • Knowledge of laws, regulations, policies, and ethics as they related to technology, cybersecurity and IT management, especially in relation to payment sector(e.g., GDPR, RTS, PFMI, DORA, etc.)
  • Good oral and written communication skills
  • Norwegian on at least B2 level is a requirement
  • Experience collaborating cross-functionally to identify and implement best practice risk processes
  • Experience delivering presentations and supporting messaging with senior leadership
  • Knowledge of Risk and Control Framework standards such as SOC 1, SOC 2, PCI-DSS, ISO
  • Strong IT technical knowledge, including emerging technologies and potential for exploitation
Job Responsibility
Job Responsibility
  • Respond to customer and regulatory inquiries and requests for information/questionnaires which includes mapping customer control domains to Mastercard controls
  • In conjunction with the business owners, help create and oversee execution of effective action plans in response to audit discoveries and compliance violations
  • Lead information collection process with business owners and communication of documentation and information needed for periodic customer and regulator meetings and reporting
  • Identify, analyse and report regulator and customer risk assessment/examinations findings and trends to internal stakeholders for action/follow-up and monitoring of progress
  • Supports policies and procedures to minimize exposure and drive the proper controls
  • Provides data analysis and drives strategy execution across key operational areas, leveraging expertise in regulatory requirements and compliance
  • Supports cross-functional initiatives to deliver on risk goals, policies and procedures
  • Develops risk processes, including identifying and implementing best practices and ensuring all risk management processes are documented, reviewed and updated regularly
  • Create a presentations and memos for senior leadership
  • Understand and support the maintenance of industry compliance standards (e.g., PCI, ISO 27001) for applications that process, store or transfer payment information and personal data and the enterprise infrastructure where they reside
  • Fulltime
Read More
Arrow Right

Graduate Cyber Security Analyst

As part of Grayce's Accelerated Development Programme, this is an exciting oppor...
Location
Location
United Kingdom , Hursley; Winchester; Southampton; Reading
Salary
Salary:
28000.00 GBP / Year
grayce.co.uk Logo
GRAYCE
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 2:1 or above in a Computer Science subject
  • Right to work in the UK unsponsored for the duration of the programme
  • Ability to work on site 5 days a week
  • Open to shift pattern working
  • This role requires a high level of security clearance. Applicants must have been based in the UK for the last five years as a minimum
  • 2:1 Undergraduate Degree: An undergraduate degree with a minimum 2:1, in a technical field like Computer Science, Information Technology, or Cyber Security
  • Technical Knowledge: We hugely value a solid foundation in technical concepts. This means being familiar with programming languages, understanding popular frameworks and tools used in cyber security
  • Analytical Problem Solving: We're looking for analytical minds that can spot patterns and think creatively. Whether it's dissecting complex issues or finding fresh angles, we highly value critical thinking skills and their application
  • Soft Skills: From effective communication styles to planning, organisation and a learning development mindset, Grayce is committed to building core consultancy skills. Stakeholder and time management are also core skills we utilise every day and we look for examples of this throughout our recruitment process
Job Responsibility
Job Responsibility
  • Work on high-impact security projects within an industry leading organisation
  • Help safeguard sensitive data, maintain public trust, and ensure operational continuity across vital services
  • Work with cutting-edge technologies, monitor and respond to security incidents, and contribute to the development of robust defence strategies
  • Collaborate with experienced professionals to identify vulnerabilities, assess risks, and implement solutions that keep our organisation secure
What we offer
What we offer
  • Competitive Salary: Starting at £28,000 with potential for significant growth
  • Industry Recognition: We help you embark on your journey with fully funded, industry-recognised qualifications designed to maximise your experience and put you in control of your career
  • Mentors and Coaches: Access a network of mentors and coaches dedicated to you, your experiences and development at Grayce
  • Wellness Support: We are here for you 24/7 with our Employee Assistance Programme, offering confidential assistance ranging from financial and legal support to health and wellbeing
  • If relocation to area required - support may be available
  • Fulltime
Read More
Arrow Right

Senior Security Monitoring and Response Analyst

The Security Operations Center (SOC) is a high-performance team responsible for ...
Location
Location
Belgium , Waterloo
Salary
Salary:
Not provided
mastercard.com Logo
Mastercard
Expiration Date
March 31, 2026
Flip Icon
Requirements
Requirements
  • Hold or able to gain one or more recognized security industry certifications like GCIH, GCFE, GCFA, ECIH, OSCP etc.
  • Proven ability to diagnose and resolve complex IT and security challenges by leveraging advanced log analysis and system-level troubleshooting in Incident Response, SRE, or System Administration environments
  • Experience with a SIEM tool and/or security orchestration applications
  • Strong understanding of ATT&CK Framework, Common Web Attacks, NIST or ISO Incident Handling Procedures, Knowledge of Windows and Unix Based Operating Systems, and Networking Principles
  • Experience with PowerShell, bash, python, or other scripting languages desired
  • Demonstrated ability to work effectively in ambiguous and/or high-pressure situations
  • Strong team‑oriented mindset with the ability to operate within a high‑performance, globally distributed team
  • Availability for on-call rotations for escalations during off-hours
Job Responsibility
Job Responsibility
  • Takes ownership of Incidents reported to the Incident Response Team end to end
  • Regularly reviews team performance and participates in metrics and quality assurance activities
  • Performs technical analysis for security Incidents, including for cases of malware, web attacks, lateral movement, and other ad hoc issues as they arise
  • Lead and conduct threat hunting activities
  • Represent the SOC Incident Response team within the European region and collaborate with regional partners
  • Identify and lead projects with the focus of making improvements to SOC operations
  • Maintain on-call hours to handle escalated events after hours and maintain the ability to provide rare emergency coverage in the SOC if needed
  • Mentor and coach SOC Tier 1 staff members to assist with improving operations and increasing their capabilities
  • Fulltime
Read More
Arrow Right

Cybersecurity Expert (SOC & Cloud)

The Security team is excited to welcome a motivated Cybersecurity Expert to help...
Location
Location
Spain , Barcelona
Salary
Salary:
Not provided
leadtech.com Logo
Leadtech Group
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor/ Master's degree in Cybersecurity, Information Security, Computer Science, or a similar discipline
  • Knowledge of Security frameworks such as ISO 27001, NIST, PCI-DSS, OWASP, GDPR
  • Knowledge of technical concepts such as cloud computing, code review, application security, cryptography, forensics, vulnerability detection (Azure & AWS are a must)
  • Deep Knowledge of cybersecurity/technical concepts such as: GNU/Linux systems
  • Microsoft Sentinel and Defender, as well as experience with writing KQL queries
  • Microsoft Azure (Network Security Groups, Recovery Services Vaults, Playbooks and Workbooks)
  • TCP/IP, DNS, and firewalls
  • Python, Bash, and SQL, Java, PHP
  • Familiarity with attack and exploitation techniques involving operating systems, applications, and devices (CISSP, CompTIA, CEH)
  • Understanding of security best practices for data and systems protection
Job Responsibility
Job Responsibility
  • Operate & optimize (and potentially Lead) a Security Operations Center (SOC)
  • Advanced Incident Investigation and Analysis
  • Handling Complex Threats: Investigating high-priority alerts escalated from Tier 1/2, such as potential APTs (Advanced Persistent Threats) or ransomware
  • Deep-Dive Analysis: Performing forensics on compromised systems, analyzing malware, and reconstructing attack chains using packet captures and log data
  • Cross-Source Correlation: Stitching together fragmented data from SIEM, EDR (Endpoint Detection and Response), and NDR (Network Detection and Response) tools to build a comprehensive picture of the attack
  • Proactive Threat Hunting and Detection Engineering
  • Threat Hunting: Proactively searching network and endpoint data for undetected, hidden threats rather than waiting for alerts
  • Rule Creation & Tuning: Developing custom detection logic and SIEM correlation rules to identify new malicious behavior
  • Reducing False Positives: Refining alert systems to minimize noise, ensuring the team focuses on genuine security incidents
  • Incident Response and Containment
What we offer
What we offer
  • Flexible career path with personalized internal training and an annual budget for external learning opportunities
  • Flexible schedule with flextime (7 - 9:30 a.m. start, 3:30 - 6 p.m. end)
  • Free Friday afternoons with a 7-hour workday
  • 35-hour workweek in July and August
  • Competitive salary
  • Full-time permanent contract
  • Top-tier private health insurance (including dental and psychological services)
  • 25 days of vacation plus your birthday off, with flexible vacation options—no blackout days
  • Office in Barcelona complete with free coffee, fresh fruit, snacks, a game room, and a rooftop terrace with stunning Mediterranean views
  • Ticket restaurant and nursery vouchers, paid directly from your gross salary
  • Fulltime
Read More
Arrow Right