We are looking for senior SOC Analyst to join our client in Basel. As part of the Cyber Security Operations team, you'll play a pivotal role in managing security operations incidents, conducting threat detections, hunting for potential threats, and overseeing access management. If you're an SOC Analyst adept at handling tier 1 and 2 incident reporting activities, this opportunity is tailor-made for you!
Tasks & Responsibilities:
Conducting SOC Tier 1/2 analysis, including alert handling, case triage, and incident management within the Cyber Security Operations team.
Conducting investigations and analysis for incident cases.
Utilizing ticketing tools to efficiently manage security alerts.
Requirements:
· Minimum of 4 years of experience in security operations/support roles (Tier 2 operation and/or engineering), demonstrating proficiency in case/alert investigations.
· Experience in digital forensics and incident response.
· Proficiency in conducting threat hunting activities.
· Strong knowledge of network protocols (HTTP, DNS, LDAP, FTP, etc.).
· Proficient understanding of networking (Firewalls, NGFW, IPS/IDS, packet captures).
· Solid understanding of log analysis and digital forensics, with expertise in leveraging SIEM technology (preferably IBM QRadar and Azure Sentinel)
Nice to have:
· Familiarity with Cloud security services, particularly Microsoft Azure.
· Basic programming skills (PowerShell and Python) for SOC task automation.
· Experience in incident resolution and participation in threat hunting activities.
· Familiarity with vulnerability management processes.
To learn more about this opportunity, please submit your application (updated CV) to nevena.jerinic@nicollcurtin.com.