·3+ years of experience in successful SOC analyst positions, preferably within an internal SOC environment.
·Proficient in technical analysis, investigations, and handling security incidents in large-scale, fast-paced corporate environments, both on-premises and in the cloud.
·Proficient in security monitoring tools and technologies.
·In-depth knowledge of operating systems and networking concepts (e.g., TCP/IP, DNS).
·Experience with enterprise security technologies including XDR, SOAR, and SIEM.
·Familiarity with cloud platforms and their security features.
·Understanding of incident response frameworks (e.g., NIST, MITRE ATT&CK).
·Strong analytical and problem-solving skills for identifying and responding to security incidents.
·Ability to work effectively in a team and communicate clearly with both technical and non-technical partners.
·Experience with scripting languages such as Python or PowerShell for automating tasks.
·Excellent written and verbal skills for documenting incidents and communicating with partners.
·Critical thinking for making informed decisions during incidents.
·Ability to handle high-stress situations with composure, efficiency, and integrity.
·Relevant certifications (e.g., CompTIA Security+/CSA+) are a plus. Certifications (or equivalents) are desirable but not a requirement.
·Desirable - completion of relevant training courses such as SEC450 (Blue Team Fundamentals), SEC511 (Continuous Monitoring and Security Operations), SEC530 (Defensible Security Architecture and Engineering), and SEC555 (SIEM with Tactical Analytics).
·Commitment to staying updated with the latest security trends and threats to ensure effective performance in the role.