Join to apply for the Junior SOC Analyst role at Vorboss
Overview
Reporting to the SOC Team Leader, the Junior SOC Analyst will play a pivotal role in safeguarding an organisation's information systems and assets. The analyst investigates and classifies security incidents, collaborates with senior SOC members and incident response teams to escalate and address potential threats, maintains detailed incident records, participates in continuous learning to stay abreast of evolving threats, and ensures compliance with security policies.
Key Responsibilities
* Actively monitor security alerts and events generated by security tools such as intrusion detection/prevention systems, firewalls, and SIEM systems.
* Investigate and analyse security incidents to determine their nature and extent, identifying potential threats and vulnerabilities.
* Prioritise and triage security alerts based on severity and potential impact; classify incidents for further investigation.
* Install, manage, and update software on all systems and networks, ensuring adequate security measures are in place.
* Undertake ad-hoc projects and other activities as required.
Day To Day
* Alert triage and prioritisation: evaluate incoming security alerts, prioritise by severity and impact, and conduct initial triage.
* Incident investigation and analysis: understand incidents, determine appropriate response and containment measures, and document findings.
* Timely incident response: execute response procedures and support containment and remediation efforts.
* Documentation and reporting: maintain detailed records and prepare monthly status reports on incidents and trends.
* Security tool management and optimisation: assist in managing SIEMs and other security tools, tuning configurations and staying informed on updates.
The Right Candidate
* Proven 1+ years’ experience in a live security monitoring environment (on-premises or cloud).
* Ability to work independently and as part of a team.
* Exposure to tools such as Wazuh, Kibana or Microsoft Sentinel.
* Exposure to vulnerability assessments, penetration testing, and generating reports.
* Experience with Linux & Windows operating environments.
* Experience with NIST security controls, governance, incident & risk management processes.
* Proficiency in preparing documentation and presenting findings.
Desirable
* Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field, or equivalent work experience/certifications.
* Proficiency with security tools including SIEM, IDS/IPS, firewalls, antivirus, and EDR.
* Entry-level certifications such as CompTIA Security+, Cisco CCNA CyberOps, or EC-Council CEH.
Benefits
* Employee Share Plan with opportunity to become a shareholder.
* Company pension scheme and bonus scheme.
* 25 days of annual leave (plus holidays) with tenure-based increases.
* Private healthcare, life assurance, and income protection.
* Access to wellbeing resources and cycle-to-work scheme.
* Discounted gym memberships and other employee benefits.
Diversity, Inclusion, And Equal Opportunities
We are an equal opportunities employer and aim to ensure that no applicant or employee experiences discrimination on grounds of gender, age, disability, religion, belief, sexual orientation, marital status, or race. We strive to create a respectful and inclusive work environment and promote equal opportunities in employment.
Apply for the position
Location notes and related postings appear in the original listing and are not part of this refined summary.
#J-18808-Ljbffr