A company is looking for a SOC Analyst (L1).
Key Responsibilities
Monitor and analyze security alerts to detect potential threats and optimize detection rules
Execute incident response activities and document incidents thoroughly for root cause analysis
Develop and enhance incident response playbooks and collaborate on automation workflows
Required Qualifications
4+ years of experience in SOC operations, cybersecurity, or incident response
Strong knowledge of EDR, SIEM, SOAR, NDR, FIM, and Antivirus / NGAV platforms
Familiarity with incident handling frameworks, threat hunting, and digital forensics
Preferred certifications include CompTIA Security+, CySA+, CEH, or equivalent
Experience with tools such as Splunk, CrowdStrike, and Cortex XSOAR is preferred
Soc Analyst • Riverside, California, United States