Our team is growing and we are looking for a new colleague to join us. We are a team that is vibing
the Silicon Valley mindset, we like to share a coffee and good jokes in between meetings. We are in
the midst of our expansion and we are looking for a team player with specialized skills to join our
tech gurus, network designers, cybersecurity experts, software developers and IT managers.
The SOC L1 will be responsible for monitoring enterprise networks and systems, detecting events,
and reporting on threats that are directed against those systems. The SOC L1 is expected to
collaborate with senior analysts to assist with efficient triage and remediation of events in the
incident queue. Utilizing SIEM technologies the SOC L1 will provide the client with a fully
comprehensive array of analytical activities in support of external threat monitoring, detection, event
analysis, and incident reporting efforts to include, analysis of inbound and outbound internet traffic,
suspicious email messages, and cloud security logs. The SOC L1 will also be responsible for the
generation of client reports both scheduled and ad hoc.
The SOC L1 preferably has knowledge of or limited experience with the following tools categories
(this is not a complete inventory):
Major Cloud Providers (AWS, Azure, GCP)
The SOC L1 may perform the following:
Provide support for complex computer network exploitation and defense techniques.
Deterring, identifying, and investigating computer and network intrusions.
Providing incident response and remediation support.
Performing comprehensive computer surveillance/monitoring,
Provides technical support for continuous monitoring, computer exploitation, and
Researches and maintains proficiency in open and closed source computer exploitation
Performs research into emerging threat sources.
Must be available for working in shifts (24/7))
Minimum of two (2) years of general work experience and one (1) year of relevant
experience in functional responsibility preferred
Bachelor’s Degree, or an equivalent combination of formal education and experience
Must have strong analytical and organizational skills
Must have concise English writing skills
Experience working a SOC and doing incident response is highly preferred
Desirable certifications: Security+, Network+, CySA+, CASP, CEH, GSEC, or other
relevant IT security certifications