Security Operations Specialist
Salary undisclosed
Apply on
Original
Simplified
As an L1 SOC Analyst, you’ll be responsible for real-time monitoring and analysis using Splunk to detect, investigate, and escalate potential security threats. This role is ideal for a candidate with a solid foundation in cybersecurity, particularly in using Splunk for threat detection and incident response.
Responsibilities
- Monitor and analyze security alerts from SIEM tools (e.g., Splunk, QRadar).
- Perform initial incident triage to determine severity and impact.
- Identify and escalate potential security incidents to senior team members.
- Conduct log analysis to detect anomalies and potential threats.
- Document incidents, findings, and actions in incident response management tools.
- Collaborate with team members to improve threat detection processes.
Qualifications
- Bachelor’s degree in Information Security, Computer Science, or related field (or equivalent experience).
- Proficiency in Splunk, including creating, optimizing, and troubleshooting queries.
- Knowledge of cybersecurity principles, threat detection, and incident response.
- Strong analytical and problem-solving skills.
- Excellent communication skills and a team-oriented mindset.
- Willingness to be placed in a banking industry environment.
- Relevant certifications (e.g., Splunk Core Certified User, CompTIA Security+, CEH).
- Experience with other SIEM tools (e.g., QRadar).
Similar Jobs