Job Description
Network Intelligence is seeking a passionate and driven Level 1 SOC Analyst to strengthen our Security Operations team. The ideal candidate will have hands-on experience with key security tools such as Splunk, Azure Sentinel, and Microsoft Defender. This is a fantastic opportunity to grow your cybersecurity career in a dynamic and collaborative environment.
Responsibilities:
- Monitor, analyze, and respond to security events and incidents
- Utilize SIEM tools like Splunk and Azure Sentinel for event correlation and threat detection
- Investigate and escalate incidents following operational guidelines
- Document incident reports and maintain accurate logs
- Work closely with senior SOC analysts and security teams for case management
Job Requirements
• Minimum 1 year of experience working in a SOC environment
• Strong experience with Splunk (Mandatory), Azure Sentinel, and Microsoft Defender
• Good understanding of SIEM and cybersecurity fundamentals
• Ability to work in shifts and under pressure
Preferred Qualifications
• Immediate joiners or candidates with a notice period of 30 days or less will be preferred
• Additional knowledge of other SIEM platforms and cybersecurity certifications is a plus
• To Apply: Send your updated resume
• Subject line of the email should be: "Application for SOC L1".
About the Company
Network Intelligence is a global cybersecurity services provider committed to helping organizations build and maintain resilient cybersecurity defenses. Our focus is on delivering top-notch security solutions and fostering a supportive, dynamic work culture. Join us and be part of a team that's making an impact in the security world!