SOC Analyst Level - 1
visionary tech services Abu Dhabi
Job Description
Our client is a leading cybersecurity firm establishing a next-generation Security Operations Center (SOC) to deliver world-class monitoring, detection, and incident response capabilities. Built on advanced analytics, automation, and threat intelligence, this SOC is designed to serve as a central pillar of enterprise defense across diverse digital environments.The company is seeking exceptional security professionals to shape, lead, and evolve this capability into a benchmark for operational excellence and resilience.
We are seeking a motivated SOC Analyst L1 to serve as the first line of defense within a modern Security Operations Center. This role is responsible for real-time monitoring, initial alert triage, enrichment, and accurate escalation in accordance with established SOC procedures and response playbooks.The SOC Analyst L1 will work with SIEM, SOAR, EDR, and cloud security tools to identify potential security threats and ensure timely detection.
This position is ideal for individuals beginning their cybersecurity career who are eager to develop strong analytical and operational skills within a structured and supportive SOC environment. The Analyst will collaborate closely with L2 and L3 analysts, Detection Engineers, and Automation Engineers to ensure high-quality outcomes across investigations and daily operations.
Requirements- Monitor SIEM alerts, dashboards, and security event queues for suspicious activity.
- Perform initial triage using enrichment procedures, predefined playbooks, and documented SOPs.
- Classify alerts and escalate validated security events to SOC Analyst L2.
- Execute basic investigation steps using SIEM queries, EDR telemetry, and cloud security logs.
- Conduct routine SOC tasks such as tooling health checks, log ingestion verification, and shift handovers.
- Document incident details clearly, ensuring completeness and accuracy in the case management system.
- Support SOAR-driven automation workflows by validating automated outputs and providing feedback for improvement.
- Follow established response workflows and maintain adherence to SOC quality standards.
- Participate in ongoing training, shadowing, and capability development to advance toward L2 analyst responsibilities.
- 0.5-2 years of experience in cybersecurity or IT operations (SOC experience is a plus).
- Basic understanding of SIEM concepts, log types, and common security event flows.
- Familiarity with security tools such as Microsoft Sentinel, Microsoft Defender, Splunk, or equivalent SIEM/EDR platforms.
- Understanding of Windows/Linux fundamentals, networking basics, and common attack vectors.
- Strong analytical skills, attention to detail, and willingness to learn.
- Ability to follow structured processes and escalate events appropriately.
- Certifications such as Security+, SC-900, or AZ-900 are beneficial but not required.
- Platforms: Microsoft Sentinel (preferred), Splunk/Elastic familiarity
- Tools: Microsoft Defender, EDR consoles, basic SOAR output review
- Processes: Alert triage, enrichment, classification, escalation
- Knowledge: Security fundamentals, MITRE ATT&CK basics, networking basics
- Begin your cybersecurity career in a structured and supportive SOC environment.
- Work with a modern toolset including SIEM, SOAR, EDR, and cloud security platforms.
- Receive continuous training, mentoring, and development aligned to SOC career progression.
- Clear pathway to SOC Analyst L2 and specialised roles (Detection, DFIR, Threat Hunting, Automation).
- Join a collaborative and high-performance security organisation focused on growth and capability maturity.
CPX AffiliateAbu Dhabi
technology.
Responsibilities
• Validate the Incidents escalated by Tier 1 SOC Security Analysts.
• Perform second levrrency of threat condition and determine which security issues may have an impact on the organization services and information's.
• Conduct...
CPX PiceanceAbu Dhabi
Job Description
Job Purpose
The Threat Intelligence Manager is an integral part of the Threat Intelligence Center. As the Threat Intelligence Manager, you will be leading a team of highly skilled Cyber Threat Intelligence Analysts to ensure...
CPX PiceanceAbu Dhabi
Contribute to the tuning and development of SIEM use cases and other security control configurations to enhance threat detection capabilities.
• Hands-on, collaborative cybersecurity testing of critical SOC environments, applications, systems, etc.
• Discover...