Search by job, company or skills
A. Key Responsibilities:
1. Monitoring and Threat Detection:
- Actively monitor Microsoft Sentinel for security alerts and identify potential threats to the organization&aposs environment.
- Evaluate and prioritize security events based on severity and potential impact.
- Detect suspicious behaviors and patterns using event logs, network data, and other security tools.
2. Incident Investigation:
- Investigate alerts to identify indicators of compromise (IOCs) such as unauthorized access, malware activity, or phishing attempts.
- Correlate data from multiple sources to build a comprehensive picture of potential security incidents.
- Document findings and maintain detailed records of all events and actions taken.
3. Escalation and Collaboration:
- Escalate verified security incidents to Level 2 analysts or the Incident Response team, providing detailed contextual information.
- Collaborate with cross-functional teams to mitigate security risks effectively.
- Maintain communication with stakeholders to ensure timely updates during incidents.
4. Initial Response and Remediation:
- Perform basic response actions under supervision, such as disabling compromised accounts, blocking malicious IPs, or containing suspicious activities.
- Support efforts to reduce false positives by fine-tuning detection rules and alert configurations.
5. Continuous Learning and Improvement:
- Stay informed on cybersecurity trends, vulnerabilities, and emerging threats.
- Participate in training programs to deepen your understanding of tools, techniques, and best practices.
- Contribute to the refinement of SOC processes and playbooks.
B. Requirements:
- Education: Bachelors degree in Computer Science, Information Security, or a related field (or equivalent experience).
- Experience:
+ 02 years of experience in a cybersecurity, IT support, or related technical role.
+ Hands-on experience with basic troubleshooting and security tools is a plus.
- Certifications: Preferred: CompTIA Security+, Microsoft Certified: Security Operations Analyst Associate, or equivalent entry-level cybersecurity certifications.
- Technical Skills:
+ Familiarity with Microsoft Sentinel and other SIEM tools.
+ Basic understanding of networking protocols (TCP/IP, DNS, VPNs) and operating system fundamentals.
+ Knowledge of cybersecurity principles, common threat types, and attack methods.
+ Ability to analyze log data, correlate events, and identify suspicious activities.
- Soft Skills:
+ Strong analytical thinking and attention to detail.
+ Effective written and verbal communication skills to convey findings clearly.
+ Ability to multitask and adapt in a fast-paced environment.
+ Team-oriented mindset with a willingness to learn and grow.
C. Benefits:
- Competitive income according to ability.
- Pay social insurance, health insurance and enjoy full benefits according to labor law.
- Annual Leaves, 13th Month salary,
- Professional, dynamic working environment.
Date Posted: 08/09/2025
Job ID: 125776223