Soc - Analyst Internship - Full time Opportunities
PROOFOPS
About the role
Job Title
Cybersecurity Analyst (SOC) Intern (Cybersecurity) - Potential Full-Time Role
Location
Dubai, UAE
Company Overview
ProofOps is a leading provider of cutting‑edge cybersecurity managed services, dedicated to safeguarding organizations across the UAE and the Middle East. We pride ourselves on delivering comprehensive, service‑oriented solutions tailored to the unique needs of our clients.
Role Overview
We are seeking a sharp, inquisitive Cybersecurity Analyst Intern to join our 24×7 Security Operations Center (SOC). This 6‑month internship offers hands‑on experience in real‑world threat monitoring, triage, and incident response, with the possibility of a full‑time offer based on performance. The ideal candidate is detail‑oriented, eager to learn, and comfortable working in a fast‑paced, shift‑based environment.
Key Responsibilities
Monitoring & Detection
- Use SIEM, EDR, and XDR platforms to monitor logs, alerts, and telemetry in real time.
- Perform initial triage, classify events, and escalate true positives per SOPs.
- Correlate multi‑source data to spot malicious patterns and reduce false positives.
Incident Response Support
- Assist senior analysts during containment, eradication, and recovery activities.
- Document incident timelines, evidence, and lessons learned for post‑mortems.
- Contribute to runbook updates and creation of new detection rules.
Threat Intelligence & Reporting
- Enrich alerts with internal and external threat‑intel feeds (IP, hash, domain).
- Produce daily shift reports and concise incident summaries for customers.
- Track key SOC KPIs (MTTD, MTTR, case volumes) and suggest improvements.
Platform Maintenance & Tuning
- Review and fine‑tune correlation rules, playbooks, and parsing logic.
- Validate log ingestion from new data sources and troubleshoot gaps.
- Assist with automation scripts/playbooks to streamline repetitive tasks.
Collaboration & Knowledge Sharing
- Work closely with engineering and customer success to ensure smooth incident hand‑offs.
- Participate in tabletop exercises and blue‑team drills to enhance response readiness.
- Stay current on emerging threats and share insights with the wider ProofOps team.
Key Qualifications
Experience & Skills
- Final‑year students or fresh graduates in Cybersecurity, Computer Science, or related fields.
- Foundational knowledge of networking (TCP/IP, OSI), Windows/Linux internals, and common attack vectors.
- Familiarity with at least one security platform (SIEM, EDR, IDS/IPS) through coursework, labs, or CTFs.
- Basic scripting skills (Python, PowerShell, or Bash) are a plus.
- Industry certifications in progress (e.g., CompTIA Security+, CC, or equivalent) are advantageous.
Soft Skills
- Analytical mindset with keen attention to detail.
- Strong written and verbal communication skills for clear incident documentation.
- Ability to manage stress, prioritize tasks, and work rotating shifts (including nights/weekends).
- Team player with a growth mindset and willingness to take initiative.
What We Offer
- Internship stipend with the potential for full‑time employment.
- Immersive experience in a modern SOC with exposure to leading security technologies.
- Mentorship from senior analysts and support toward relevant certifications.
- Clear career‑growth pathways across blue, purple, and red‑team tracks.
- Flexible, hybrid work environment with a culture that values learning and innovation.
Job Type
Full-time
Application Question(s)
- can join immediately
Education
- Bachelor's (Required)
Work Location
In person
Requirements
- Final-year students or fresh graduates in Cybersecurity, Computer Science, or related fields.
- Foundational knowledge of networking (TCP/IP, OSI), Windows/Linux internals, and common attack vectors.
- Familiarity with at least one security platform (SIEM, EDR, IDS/IPS) through coursework, labs, or CTFs.
- Basic scripting skills (Python, PowerShell, or Bash) are a plus.
- Industry certifications in progress (e.g., CompTIA Security+, CC, or equivalent) are advantageous.
- Analytical mindset with keen attention to detail.
- Strong written and verbal communication skills for clear incident documentation.
- Ability to manage stress, prioritize tasks, and work rotating shifts (including nights/weekends).
- Team player with a growth mindset and willingness to take initiative.
Responsibilities
- Use SIEM, EDR, and XDR platforms to monitor logs, alerts, and telemetry in real time.
- Perform initial triage, classify events, and escalate true positives per SOPs.
- Correlate multi-source data to spot malicious patterns and reduce false positives.
- Assist senior analysts during containment, eradication, and recovery activities.
- Document incident timelines, evidence, and lessons learned for post-mortems.
- Contribute to runbook updates and creation of new detection rules.
- Enrich alerts with internal and external threat-intel feeds (IP, hash, domain).
- Produce daily shift reports and concise incident summaries for customers.
- Track key SOC KPIs (MTTD, MTTR, case volumes) and suggest improvements.
- Review and fine-tune correlation rules, playbooks, and parsing logic.
- Validate log ingestion from new data sources and troubleshoot gaps.
- Assist with automation scripts/playbooks to streamline repetitive tasks.
- Work closely with engineering and customer success to ensure smooth incident hand-offs.
- Participate in tabletop exercises and blue-team drills to enhance response readiness.
- Stay current on emerging threats and share insights with the wider ProofOps team.
Benefits
Skills
Don't send a generic resume
Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.
Get started free