Skip to content
mimi

Level 1 (L1) SOC Analyst

Al Reem Group

UAE · On-site Mid Level Today

About the role

Position Title

Level 1 (L1) SOC Analyst

Location

Abu Dhabi

Job Type

Full Time

Role Overview

The Level 1 SOC Analyst is responsible for the initial monitoring, triage, and escalation of security incidents within the Security Operations Center (SOC). This role focuses on real-time threat detection, log analysis, and first-level response activities.

Key Responsibilities

  • Monitor SIEM (Security Information and Event Management) tools to identify suspicious activities, alerts, and security incidents.
  • Perform initial triage of security alerts to determine severity, urgency, and potential impact.
  • Escalate confirmed security incidents to Level 2 SOC Analysts for further investigation.
  • Identify false positives and adjust monitoring rules accordingly.
  • Assist in executing predefined incident response playbooks for common security incidents.
  • Document all alerts, incidents, and actions taken in the SOC's ticketing system.
  • Support vulnerability scanning activities by providing relevant insights and reporting potential exposures.
  • Collaborate with IT and security teams to remediate detected threats when appropriate.

Required Qualifications and Skills

  • 2-6 years experience in SOC operations, security monitoring, or incident response.
  • Proficiency in using SIEM platforms such as Splunk, QRadar, or Microsoft Sentinel.
  • Familiarity with SOAR (Security Orchestration, Automation, and Response) tools and automation playbooks.
  • Ability to identify and analyze common security threats such as phishing, malware, and unauthorized access.
  • Strong understanding of network protocols, firewall logs, and intrusion detection systems (IDS/IPS).
  • Excellent documentation and reporting skills.
  • Certifications such as CompTIA Security+, EC-Council CEH, or equivalent are preferred.

Requirements

  • Proficiency in using SIEM platforms such as Splunk, QRadar, or Microsoft Sentinel.
  • Familiarity with SOAR (Security Orchestration, Automation, and Response) tools and automation playbooks.
  • Ability to identify and analyze common security threats such as phishing, malware, and unauthorized access.
  • Strong understanding of network protocols, firewall logs, and intrusion detection systems (IDS/IPS).
  • Excellent documentation and reporting skills.

Responsibilities

  • Monitor SIEM (Security Information and Event Management) tools to identify suspicious activities, alerts, and security incidents.
  • Perform initial triage of security alerts to determine severity, urgency, and potential impact.
  • Escalate confirmed security incidents to Level 2 SOC Analysts for further investigation.
  • Identify false positives and adjust monitoring rules accordingly.
  • Assist in executing predefined incident response playbooks for common security incidents.
  • Document all alerts, incidents, and actions taken in the SOCs ticketing system.
  • Support vulnerability scanning activities by providing relevant insights and reporting potential exposures.
  • Collaborate with IT and security teams to remediate detected threats when appropriate.

Skills

Firewall logsIDS/IPSMicrosoft SentinelNetwork protocolsQRadarSecurity Information and Event ManagementSOARSplunk

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free