Tek Experts provides the services of a uniquely passionate and expert workforce that takes intense pride in helping companies manage their business operations. We care about the work we do, the companies we partner with and the customers they serve. By delivering unrivaled levels of business and IT support, we make sure nothing gets in the way of our clients leaving their mark on the world. Our experience and expertise enable companies to focus on their core objectives, expand their service offering and exceed their customer expectations.
- The SOC Analyst will be responsible for real-time monitoring and analysis of security alerts using SIEM platforms, handling initial triage, and escalating confirmed incidents. You'll collaborate closely with other SOC team members and stakeholders to ensure continuous situational awareness, adherence to SLAs, and delivery of high-quality security services.
Responsibilities
- Continuously monitor and analyze security alerts generated by SIEM and other detection platforms.
- Perform initial triage and classification of potential security incidents.
- Escalate validated incidents to higher-tier SOC analysts with appropriate documentation and evidence.
- Execute runbooks/playbooks for known alert patterns and threat types.
- Document incident details, timelines, and response actions in the incident tracking system.
- Generate, review, and distribute detailed SOC activity and incident response reports.
- Collaborate with internal and external teams to resolve security incidents effectively.
- Maintain awareness of emerging cyber threats, attack vectors, and industry developments.
- Follow defined SLAs, escalation paths, and incident handling procedures.
- Contribute to high-quality service delivery and client-specific threat mitigation initiatives.
- Ensure seamless handoffs and situational awareness through effective team collaboration.
Qualifications
- 1-3 years of experience working in a Security Operations Center (SOC) environment.
- Hands-on experience with SIEM tools for event investigation, alert filtering, and rule analysis.
- Strong understanding of cybersecurity principles, threat actors, and common attack techniques.
- Familiarity with: Network protocols and traffic analysis, Windows and Linux logs, Endpoint protection tools, System hardening best practices
- Awareness of the MITRE ATT&CK framework and its application to threat detection.
- Basic proficiency in query languages such as KQL is a plus.
- Strong analytical, troubleshooting, and communication skills.
- Attention to detail and the ability to manage tasks in a high-pressure, dynamic environment.
- Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Preferred certifications include:, Microsoft SC-200 (Security Operations Analyst Associate), CompTIA Security+, CySA+, or CEH (Certified Ethical Hacker), Other relevant certifications in incident detection and response
Method of Application
Signup to view application details.
Signup Now