CrawlJobs Logo

SOC Analyst (Level 1)

keyrock.com Logo

Keyrock

Location Icon

Location:

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

As a SOC Analyst (Level 1), you are the first line of defense for monitoring, triaging, and escalating security alerts across Keyrock’s cloud-first, high-availability trading environment. You will follow playbooks/runbooks to validate alerts, enrich investigations with context, and ensure timely escalation to Level 2/Incident Response.

Job Responsibility:

  • 24/7 monitoring and alert triage across SIEM/EDR/cloud security tooling
  • identify false positives vs. credible threats and set appropriate severity
  • Initial investigation and enrichment: gather relevant logs/telemetry, add context, and document findings clearly in the case/ticketing system
  • Escalation and coordination: escalate confirmed/suspected incidents quickly and cleanly to L2/IR with a complete handoff (timeline, scope, IOCs, actions taken)
  • Runbook execution: follow SOPs for common events (phishing, suspicious logins, endpoint detections, cloud key/token risk, malware alerts, data exfiltration signals), including containment actions you’re authorized to perform
  • Threat-aware analysis: map alerts to adversary behaviors (e.g., MITRE ATT&CK techniques) to improve understanding and escalation quality
  • Operational hygiene: maintain accurate shift handovers, update watchlists and investigation notes, and identify recurring alert patterns for tuning recommendations

Requirements:

  • 0–2 years in a SOC / security monitoring / IT operations role (or equivalent hands-on experience, internships, labs)
  • Practical knowledge of security fundamentals: networking, DNS, HTTP(S), identity/authentication, and malware basics
  • Familiarity with log investigation and event triage concepts
  • Familiarity with common security tools and workflows (any of the following): SIEM (Splunk/Elastic/Sentinel), EDR (CrowdStrike/Defender), ticketing (Jira/ServiceNow), basic SOAR concepts
  • Strong written communication: produce clear, escalation-ready tickets and timelines
  • Ability to work rotating shifts/on-call (as required), including weekends/holidays depending on coverage model

Nice to have:

  • Cloud security exposure (AWS/GCP/Azure): CloudTrail/Activity Logs, IAM analysis, detections for token/key misuse
  • Familiarity with incident response frameworks/processes (e.g., NIST incident response guidance)
  • Exposure to detection engineering concepts (rule tuning, false-positive reduction), or basic scripting (Python/Bash) for investigation automation
  • Knowledge of the digital-asset ecosystem (exchanges, custody concepts, operational risk in 24/7 trading environments)
  • Certifications (optional): Security+, Blue Team Level 1, SSCP, or equivalent practical training
What we offer:
  • Work in a fast-moving, globally distributed environment shaping the future of digital financial markets
  • A culture that expects ownership, learning, and continuous improvement

Additional Information:

Job Posted:
February 18, 2026

Employment Type:
Fulltime
Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for SOC Analyst (Level 1)

SOC Level 1 Analyst

Inetum is a European leader in digital services. Inetum’s team of 28,000 consult...
Location
Location
Portugal , Lisbon
Salary
Salary:
Not provided
https://www.inetum.com Logo
Inetum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 1/2 years of experience as a SOC level 1 analyst or similar
  • Experience with MS Windows Azure
  • Strong knowledge of IP networks - Internet Protocol (IPv4, IPv6)
  • Familiarity with DNS - Domain Name System
  • Knowledge of Sentinel is valuable
  • Analytical mindset and attention to detail
  • Enjoy working in a team, proactivity, and results orientation
  • Good level of English
  • Availability to work 24x7 shifts
Job Responsibility
Job Responsibility
  • Monitoring the SIEM platform and other systems that generate vulnerability alerts and security incident events
  • Periodic verification of sources that need to be managed and analysis of security events
  • Identification and notification of security alerts
  • Recording security incidents
  • Performing the first level of incident handling (assessment, triage, identification of actions to be taken, escalation, validation)
  • Verification of effective incident resolution
  • Fulltime
Read More
Arrow Right

Incident Response Analyst

In order to support our international Incident Response Team, Airbus Defense and...
Location
Location
Spain , Getafe
Salary
Salary:
Not provided
airbus.com Logo
Airbus
Expiration Date
April 15, 2026
Flip Icon
Requirements
Requirements
  • Educated to degree level in Cyber security, computer science or relevant working experience
  • Certifications of GIAC or comparable
  • Experience and knowledge in the following items are welcome: perform reverse-engineering, Hosts forensic analysis
  • Negotiation level in English
  • This position will require a security clearance or will require being eligible for clearance by the recognized authorities
Job Responsibility
Job Responsibility
  • Investigation of SOC alerts and security incidents
  • Improvement of the threat detection and response capabilities
  • Support the SOC in its daily operations
  • Support incident response in crisis mode: Be part of the on-call crisis team (deployment reactivity constraints)
  • Perform reverse-engineering
  • Hosts forensic analysis
  • Contribute to the industrialization of: Security Tooling
  • Network analysis
  • Host analysis
  • Detection: Use Case development and alerts
What we offer
What we offer
  • Vacation days and additional days-off along the year (+35 days off in total)
  • Attractive salary and compensation package
  • Hybrid model of working when possible, promoting the work-life balance (40% remote work)
  • Collective transport service in some sites
  • Benefits such as health insurance, employee stock options, retirement plan...
  • On-site facilities (among others): free canteen, kindergarten, medical office
  • Possibility to collaborate in different social and corporate social responsibility initiatives
  • Excellent upskilling opportunities and great development prospects in a multicultural environment
  • Special rates in products & benefits
  • Fulltime
Read More
Arrow Right

Security Analyst Detect & Respond

Become a Security Guardian! We are seeking a highly motivated Security Analyst (...
Location
Location
Poland , Łódź
Salary
Salary:
Not provided
arrive.com Logo
Arrive
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4+ years of hands-on experience in a Security Analyst, SOC, or Incident Response role
  • Strong experience with SIEM platforms (e.g., Splunk, Sentinel, Crowdstrike, Rapid7)
  • Hands-on experience with EDR tools (e.g., CrowdStrike, Defender, SentinelOne)
  • Strong understanding of networking fundamentals, security principles, and common attack vectors
  • Excellent analytical, communication, and collaboration skills, with the ability to translate technical findings into business-impact language
Job Responsibility
Job Responsibility
  • Investigate and analyze security alerts from SIEM, EDR, Dark Web Monitoring & Cloud Security Tools
  • Provide comprehensive support for incident response activities, including containment, eradication, and recovery
  • Perform thorough root cause analysis and document incident findings
  • Develop and refine incident response playbooks
  • Work effectively and collaboratively with our Managed Security Service Provider (MSSP)
  • Conduct hypothesis-driven threat hunting across endpoint, network, and cloud environments
  • Leverage EDR tooling to detect lateral movement and suspicious activity
  • Stay continuously up-to-date on emerging threat intelligence and attacker behaviors
  • Managing the incident from the moment it is escalated by Tier 1 until final closure, ensuring adherence to established frameworks like the NIST or SANS incident response lifecycles
  • Acting as the primary technical point of contact during an active incident. This involves directing IT operations, network engineers, or system administrators on exactly what systems need to be isolated, patched, or restored
  • Fulltime
Read More
Arrow Right

SOC Analyst Senior Cyber Security Engineer

Position: SOC Analyst Senior Cyber Security Engineer. Experience: 2 to 4 yrs. Lo...
Location
Location
India , Noida
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 2-year experience working in security operations environment or 2 years’ experience in IT operations Data Centre, SOC/NOC
  • Very good English verbal & written communication skills
  • Good understanding of networking concepts and operating systems
  • Good understanding of key customer infrastructure components - Proxy, Firewall, Antivirus
  • Technical capability and maturity to assist and guide the team of Analysts
  • Should have worked and have good understanding of the following security tools: (SentinelOne IR, Service Now Tool, Microsoft Defender)
  • Ability to learn new skills and adopting new technologies and work collaboratively in an international context
  • Capability to understand and work in a complex environment and concern for quality and detail
  • Ability to synthesize and analyze a variety of contexts and manage customer confidentiality
  • Knowledge on ITIL basic practice
Job Responsibility
Job Responsibility
  • Ensure all threats at customer environment are detected and notified in timely manner
  • Continuous review of Incidents to ensure compliance with standard operating procedures
  • Provide training and feedback to Security Analysts to ensure high quality deliverables
  • Identify and execute continuous improvements in monitoring including threat scenarios and operating procedures
  • Interact with customers on queries and improvements related to service deliverables
  • Should know and able to contribute to MSSP services (Managed Security Services Provider)
  • Perform root cause analysis for any errors /deficiencies pointed out in the monitoring service
  • Review the alert to determine relevancy and urgency, create new trouble tickets for incident
  • Ensure thorough knowledge of Protection of Personal Identifiable Information and GDPR
Read More
Arrow Right

Managed Services Operations Specialist

The Managed Services Operations Specialist is a skilled cybersecurity specialist...
Location
Location
Romania , Bucuresti
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 1 year of experience working in an industry standard SOC in security analysis/incident handling and security monitoring
  • Experience or at least knowledge of Cloud technologies (Azure preferred)
  • Experienced in SIEM (Sentinel, Splunk, QRadar Chronicle, McAfee, CryptoSIM, Logsign etc.) and SOAR products
  • Knowledgeable in security topics such as next gen firewalls (Fortinet, PaloAlto, CheckPoint) and other network security devices and software such as WAF, DLP, anti-virus/anti-malware, threat intelligence, etc.
  • General understanding of attacker tools, tactics and techniques and referencing on MITRE ATT&CK, knowledge of MITRE Shield
  • Familiar with tools for malware analysis, open-source threat Intelligence and SOAR
  • Detail-oriented, problem-solving mindset with critical and analytical thinking
  • Ethical integrity, good at teamwork, responsible and highly motivated
  • Result-oriented, inquisitive, eager to learn new threats, technologies, and security practices
  • Fluent in English to read and interpret global reports and technical articles published in the field of cybersecurity
Job Responsibility
Job Responsibility
  • Monitor security access and identify security incidents using Security Information and Event Management (SIEM) tools
  • Ensure continuity and availability of the modular platform components and security systems required
  • Perform initial analysis and investigation of security alerts to differentiate false positives from true incidents. This includes understanding attack vectors, malware behavior, and the potential impact of different types of threats
  • Document security incidents and actions taken in response
  • Escalate complex incidents to higher-level SOC threat responders and experts for further analysis and resolution, working in partnership with the L2 Central SOC teams and other SOCs
  • Participate in developing incident response protocols and procedures
What we offer
What we offer
  • Hybrid working regime 2 days from the office, 3 days remote
  • Special discounts for Vodafone employees, Friends & Family offers
  • Demo telephone subscription - unlimited (voice and data)
  • Voucher for the purchase of a mobile phone
  • Medical subscription to a top private clinic & other medical benefits
  • Insurance for hospitalization and surgical interventions
  • Life insurance
  • Meal tickets
  • Bookster subscription
  • Participation in development programs and challenging projects in the leadership area
  • Fulltime
Read More
Arrow Right

Graduate Cyber Security Analyst

As part of Grayce's Accelerated Development Programme, this is an exciting oppor...
Location
Location
United Kingdom , Hursley; Winchester; Southampton; Reading
Salary
Salary:
28000.00 GBP / Year
grayce.co.uk Logo
GRAYCE
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 2:1 or above in a Computer Science subject
  • Right to work in the UK unsponsored for the duration of the programme
  • Ability to work on site 5 days a week
  • Open to shift pattern working
  • This role requires a high level of security clearance. Applicants must have been based in the UK for the last five years as a minimum
  • 2:1 Undergraduate Degree: An undergraduate degree with a minimum 2:1, in a technical field like Computer Science, Information Technology, or Cyber Security
  • Technical Knowledge: We hugely value a solid foundation in technical concepts. This means being familiar with programming languages, understanding popular frameworks and tools used in cyber security
  • Analytical Problem Solving: We're looking for analytical minds that can spot patterns and think creatively. Whether it's dissecting complex issues or finding fresh angles, we highly value critical thinking skills and their application
  • Soft Skills: From effective communication styles to planning, organisation and a learning development mindset, Grayce is committed to building core consultancy skills. Stakeholder and time management are also core skills we utilise every day and we look for examples of this throughout our recruitment process
Job Responsibility
Job Responsibility
  • Work on high-impact security projects within an industry leading organisation
  • Help safeguard sensitive data, maintain public trust, and ensure operational continuity across vital services
  • Work with cutting-edge technologies, monitor and respond to security incidents, and contribute to the development of robust defence strategies
  • Collaborate with experienced professionals to identify vulnerabilities, assess risks, and implement solutions that keep our organisation secure
What we offer
What we offer
  • Competitive Salary: Starting at £28,000 with potential for significant growth
  • Industry Recognition: We help you embark on your journey with fully funded, industry-recognised qualifications designed to maximise your experience and put you in control of your career
  • Mentors and Coaches: Access a network of mentors and coaches dedicated to you, your experiences and development at Grayce
  • Wellness Support: We are here for you 24/7 with our Employee Assistance Programme, offering confidential assistance ranging from financial and legal support to health and wellbeing
  • If relocation to area required - support may be available
  • Fulltime
Read More
Arrow Right

Cybersecurity Expert (SOC & Cloud)

The Security team is excited to welcome a motivated Cybersecurity Expert to help...
Location
Location
Spain , Barcelona
Salary
Salary:
Not provided
leadtech.com Logo
Leadtech Group
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor/ Master's degree in Cybersecurity, Information Security, Computer Science, or a similar discipline
  • Knowledge of Security frameworks such as ISO 27001, NIST, PCI-DSS, OWASP, GDPR
  • Knowledge of technical concepts such as cloud computing, code review, application security, cryptography, forensics, vulnerability detection (Azure & AWS are a must)
  • Deep Knowledge of cybersecurity/technical concepts such as: GNU/Linux systems
  • Microsoft Sentinel and Defender, as well as experience with writing KQL queries
  • Microsoft Azure (Network Security Groups, Recovery Services Vaults, Playbooks and Workbooks)
  • TCP/IP, DNS, and firewalls
  • Python, Bash, and SQL, Java, PHP
  • Familiarity with attack and exploitation techniques involving operating systems, applications, and devices (CISSP, CompTIA, CEH)
  • Understanding of security best practices for data and systems protection
Job Responsibility
Job Responsibility
  • Operate & optimize (and potentially Lead) a Security Operations Center (SOC)
  • Advanced Incident Investigation and Analysis
  • Handling Complex Threats: Investigating high-priority alerts escalated from Tier 1/2, such as potential APTs (Advanced Persistent Threats) or ransomware
  • Deep-Dive Analysis: Performing forensics on compromised systems, analyzing malware, and reconstructing attack chains using packet captures and log data
  • Cross-Source Correlation: Stitching together fragmented data from SIEM, EDR (Endpoint Detection and Response), and NDR (Network Detection and Response) tools to build a comprehensive picture of the attack
  • Proactive Threat Hunting and Detection Engineering
  • Threat Hunting: Proactively searching network and endpoint data for undetected, hidden threats rather than waiting for alerts
  • Rule Creation & Tuning: Developing custom detection logic and SIEM correlation rules to identify new malicious behavior
  • Reducing False Positives: Refining alert systems to minimize noise, ensuring the team focuses on genuine security incidents
  • Incident Response and Containment
What we offer
What we offer
  • Flexible career path with personalized internal training and an annual budget for external learning opportunities
  • Flexible schedule with flextime (7 - 9:30 a.m. start, 3:30 - 6 p.m. end)
  • Free Friday afternoons with a 7-hour workday
  • 35-hour workweek in July and August
  • Competitive salary
  • Full-time permanent contract
  • Top-tier private health insurance (including dental and psychological services)
  • 25 days of vacation plus your birthday off, with flexible vacation options—no blackout days
  • Office in Barcelona complete with free coffee, fresh fruit, snacks, a game room, and a rooftop terrace with stunning Mediterranean views
  • Ticket restaurant and nursery vouchers, paid directly from your gross salary
  • Fulltime
Read More
Arrow Right

Information Security Analyst

To be part of PA Group Systems Security Operations Centre team, providing in-dep...
Location
Location
United Kingdom , Melbourn
Salary
Salary:
Not provided
paconsulting.com Logo
PA Consulting
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 2+ years of proven technical experience across multi-disciplinary IT fields or equivalent relevant education
  • Good attention to detail, well organised and capable of working under pressure
  • Strong log analysis and correlation skills
  • Knowledge of Logging/SIEM systems
  • Knowledge of Data Leak Prevention systems
  • Knowledge of Intrusion Detection systems
  • Ability to communicate at all levels
  • Ability to work effectively as part of a team
Job Responsibility
Job Responsibility
  • Review daily security system logs and alerts - Firewall/Intrusion Detection System/Data Leak Prevention/Endpoint Detection and Response – and identify security issues
  • Provide insight into the countermeasures PA should adopt and generate key performance indicator metrics for the security board
  • Works as a technical resource in security related projects
  • Perform forensic analysis as required
  • Working with operational teams, ensure vulnerabilities are resolved
  • Review security bulletins for threats. Liaise with key security firms reviewing threat reports
  • Provide out of hours On-Call availability and response to high severity incidents (usually 1 week per month – paid)
  • Work closely with the SOC Manager and Director of Cyber Security
  • Work with GS operational staff who require assistance with technical security issues
  • Interface with the rest of Group Systems on new projects/support functions undertaken
What we offer
What we offer
  • Health and lifestyle perks accompanying private healthcare
  • 25 days annual leave (plus a bonus half day on Christmas Eve) with the opportunity to buy 5 additional days
  • Generous company pension scheme
  • Opportunity to get involved with community and charity-based initiatives
  • Annual performance-based bonus
  • PA share ownership
  • Tax efficient benefits (cycle to work, give as you earn)
  • Fulltime
Read More
Arrow Right