We are looking for a proactive and analytical Security Operations Center (SOC) Analyst to join our AI-driven threat detection and incident response team. The ideal candidate will be experienced in monitoring, analyzing, and responding to security threats using both traditional methods and modern AI-powered tools.
Key Responsibilities :
- Monitor and analyze security alerts from various sources including SIEMs, EDRs, and AI / ML platforms.
- Use AI / ML-based tools to identify, triage, and respond to cyber threats in real time.
- Investigate security incidents and perform root cause analysis.
- Collaborate with threat intelligence, incident response, and engineering teams to mitigate risk.
- Continuously refine detection rules and use case development.
- Maintain and enhance runbooks and incident response processes.
- Provide regular reporting on SOC metrics and security events.
Qualifications :
Bachelor's degree in Cybersecurity, Computer Science, or a related field.years of experience working in a SOC environment.Experience with SIEM platforms (, Splunk, QRadar, LogRhythm) and EDR tools (, CrowdStrike, SentinelOne).Familiarity with AI / ML technologies used in threat detection (, Darktrace, Vectra AI, Microsoft Defender for Endpoint).Strong knowledge of MITRE ATT&CK framework and incident response lifecycle.Relevant certifications such as CEH, GCIA, GCIH, or CompTIA CySA+ are a plus.