Search by job, company or skills

PFCC Group

Security Operations Center Analyst

new job description bg glownew job description bg glownew job description bg svg
  • Posted 6 days ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Our client is recognized for its innovation, cutting-edge technology, and strong commitment to security, integrity, and employee development. You'll be joining a collaborative global environment where continuous improvement, learning, and career growth are supported and encouraged.

Responsibilities:

  • Lead advanced investigations on escalated security incidents, analyzing logs across firewalls, network devices, web proxies, IDS/IPS, AV and EDR platforms.
  • Perform root cause, scope, and impact analysis; develop containment and remediation steps; document findings throughout the incident lifecycle.
  • Guide and mentor CSOC Analysts to improve triage quality and event handling.
  • Tune and optimize SIEM and EDR tools to reduce false positives and enhance detection accuracy.
  • Conduct proactive threat hunting and leverage threat intelligence to identify suspicious activity and emerging threats.
  • Support forensic and malware analysis activities as needed.
  • Prepare incident reports and communicate findings to management and stakeholders.
  • Contribute to the development and enhancement of incident response playbooks, procedures, and SOC processes.
  • Collaborate with infrastructure and security teams to address vulnerabilities and strengthen security controls.
  • Participate in post-incident reviews to identify gaps and drive continuous improvement.
  • Serve as a technical escalation point for complex or high-severity incidents.

Skills & Competencies:

  • Strong understanding of core network protocols (TCP/IP, DNS, FTP, etc.) and network traffic analysis.
  • Proficient in packet capture and analysis tools (e.g., Wireshark) and netflow analysis.
  • Hands-on experience with SIEM platforms (Splunk, QRadar, ArcSight) and EDR solutions.
  • Solid working knowledge of Windows, Linux, and UNIX environments.
  • Experience using threat intelligence platforms and applying intel to proactive detection.
  • Familiarity with exploit techniques, common vulnerabilities, and attack vectors.
  • Strong understanding of the incident response lifecycle, digital forensics, and malware analysis fundamentals.
  • Scripting or automation capability (e.g., Python, PowerShell) to enhance detection or workflow efficiency.
  • Strong analytical, communication, and problem-solving skills; ability to handle multiple priorities effectively.

Requirements:

  • 35 years in cybersecurity or IT, including minimum 2 years in SOC or Incident Response.
  • Degree in Computer Science, Information Security, or equivalent experience.
  • At least one relevant certification (Security+, CEH, GSEC, or equivalent).

More Info

Job Type:
Industry:
Function:
Employment Type:

About Company

Job ID: 134923235