We are looking for a skilled Cyber Security Analyst to join our security team. The ideal candidate will have a solid background in SIEM technologies, incident analysis, and network security concepts, combined with a passion for staying ahead of evolving cyber threats. This role requires expertise in monitoring, investigating, and managing security incidents, as well as collaborating effectively with Level 2 and Level 3 teams. The position involves on-call support, including coverage for after-hours and weekends.
 Key Responsibilities
  - Security Monitoring. Act as a primary monitor for security events, identifying, analyzing, and responding to alerts in real-time using tools like Sentinel, LogRhythm, Splunk, or QRadar.
  - Incident Investigation. Conduct thorough investigations of security incidents, analyzing logs and patterns to determine threat vectors, attack methods, and resolution pathways.
  - Network and Firewall Analysis. Review and analyze firewall rule bases, suggest remediation measures, and ensure the security infrastructure aligns with best practices.
  - Threat Intelligence and Analysis. Stay updated on emerging cyber threats, vulnerabilities, and intelligence, integrating insights into proactive threat detection and response.
  - Standard Operating Procedures (SOP). Follow established SOPs for incident response and other activities, ensuring consistency and thoroughness in all processes.
  - Stakeholder Engagement. Collaborate with Level 2 and Level 3 security teams on escalated issues, maintaining clear and effective communication throughout the incident lifecycle.
  
 Required Skills and Qualifications
  - Experience. Minimum of 2 years in Cyber Security, focusing on SIEM operations and event analysis.
  - SIEM Knowledge. Proficiency with SIEM platforms such as Sentinel, LogRhythm, Splunk, or QRadar.
  - Technical Skills. Strong understanding of network security concepts, firewall configurations, threat detection methods, and TTPs (tactics, techniques, and procedures) used by attackers.
  - Analytical Ability. Demonstrated skills in incident investigation, with the ability to analyze logs and identify security events.
  - Certifications. Industry-recognized certifications like CompTIA Security+, CEH, or other relevant credentials. Microsoft certifications such as AZ-900, SC-100, or SC-200 are also beneficial.
  - Education. Bachelor’s degree in Information Technology or a related field.
  - Communication Skills. Effective verbal and written communication, with the ability to interact with both technical and non-technical team members.
  
 Join Us
 If you're ready to take on critical security challenges in a dynamic environment and have the expertise to monitor and defend against cyber threats, we encourage you to apply.