- Company Name
- WDS Global Limited
- Job Title
- Security Operations Center Analyst
- Job Description
-
**Job Title**
Security Operations Center Analyst
**Role Summary**
Serve as a senior SOC analyst responsible for monitoring, detecting, investigating, and responding to security incidents. Leverage SIEM, incident response, and endpoint platforms to maintain enterprise security posture and reduce risk exposure.
**Expectations**
- Excellent analytical judgment and decision‑making under pressure.
- Deliver accurate, timely incident investigations and evidence collection.
- Collaborate across security teams and maintain documentation of all findings.
- Actively improve SOC processes and automation to increase efficiency and accuracy.
**Key Responsibilities**
1. **Alert Management** – Monitor Splunk SIEM for real‑time alerts, triage events, and initiate appropriate response actions.
2. **Incident Response** – Use TheHive for case management, coordinate containment, eradication, and recovery activities.
3. **Endpoint Security** – Operate EDR/XDR solutions (e.g., Bitdefender Gravity) to investigate host‑level threats.
4. **Forensic Analysis** – Collect, preserve, and analyze digital evidence to support incident investigations and potential legal actions.
5. **Automation & Playbooks** – Design, test, and maintain SOC automation scripts and playbooks to streamline repetitive tasks.
6. **Scripting & Programming** – Develop tools in PowerShell, Python, Ruby, or Bash to enhance monitoring, data collection, and reporting.
7. **Threat Intelligence & Hunting** – Proactively search for indicators of compromise and emerging adversary tactics.
8. **Reporting** – Produce clear, concise incident reports and post‑mortems for stakeholders.
9. **Shift Support** – Participate in on‑duty SOC shifts as required (24/7 coverage).
**Required Skills**
- Deep experience with SIEM platforms (Splunk).
- Proficiency in incident response platforms (TheHive) and SOC automation.
- Hands‑on with EDR/XDR technologies (Bitdefender Gravity, etc.).
- Strong background in incident response and digital forensics.
- Advanced scripting/programming in PowerShell, Python, Ruby, Bash.
- Familiarity with threat hunting, malware analysis, and network forensics.
- Excellent communication, documentation, and teamwork skills.
**Required Education & Certifications**
- Bachelor’s degree in Computer Science, Information Security, or a related field (equivalent professional experience acceptable).
- Minimum 6 years of experience performing SOC analyst duties.
- Valid security clearance preferred or required.
- Preferred certifications: CISSP, CISM, GCIA, GCIH, CEH, or equivalent SOC‑specific credential.