Epicareer Might not Working Properly
Learn More

Security Operations Specialist

Salary undisclosed

Apply on


Original
Simplified

As an L1 SOC Analyst, you’ll be responsible for real-time monitoring and analysis using Splunk to detect, investigate, and escalate potential security threats. This role is ideal for a candidate with a solid foundation in cybersecurity, particularly in using Splunk for threat detection and incident response.

Responsibilities

  • Monitor and analyze security alerts from SIEM tools (e.g., Splunk, QRadar).
  • Perform initial incident triage to determine severity and impact.
  • Identify and escalate potential security incidents to senior team members.
  • Conduct log analysis to detect anomalies and potential threats.
  • Document incidents, findings, and actions in incident response management tools.
  • Collaborate with team members to improve threat detection processes.

Qualifications

  • Bachelor’s degree in Information Security, Computer Science, or related field (or equivalent experience).
  • Proficiency in Splunk, including creating, optimizing, and troubleshooting queries.
  • Knowledge of cybersecurity principles, threat detection, and incident response.
  • Strong analytical and problem-solving skills.
  • Excellent communication skills and a team-oriented mindset.
  • Willingness to be placed in a banking industry environment.
  • Relevant certifications (e.g., Splunk Core Certified User, CompTIA Security+, CEH).
  • Experience with other SIEM tools (e.g., QRadar).
Similar Jobs

7d ago

Full Time, onsite, onsite

Salary undisclosed

4d ago

Full Time, onsite, onsite

Salary undisclosed