Monitor network and security alerts for intrusion attempts, anomalies, and potential compromises.
Perform detailed analysis and apply threat mitigation and escalation procedures.
Correlate threat intelligence data across various security platforms (SIEM, IDS/IPS, EDR).
Interface with internal teams, external partners, and vendors to ensure coordinated incident handling.
Create and maintain SOC playbooks, incident reports, situation reports (SITREPs), and performance metrics.
Lead and mentor junior analysts, ensuring adherence to SOC processes and continuous improvement.
Contribute to proactive threat hunting, incident containment, and recovery activities.
Participate in quality control checks and documentation reviews to maintain operational excellence.
Minimum 8 years of experience in Threat Management, SOC Operations, or Incident Response.
Proven leadership experience within a SOC environment (mentoring analysts, managing operations, coordinating incidents).
Hands-on expertise with cybersecurity monitoring tools including SIEM, IDS/IPS, EDR, and log correlation systems.
Strong understanding of network protocols, host-level security, and general cybersecurity principles.
Excellent communication skills for collaboration with both technical teams and senior management.
Willingness and ability to work night shifts, weekends, and holidays as needed for coverage and incident response.
Experience with threat hunting and malware analysis.
Familiarity with NetFlow analysis, system logs, and incident response frameworks.
Knowledge of cybersecurity and privacy principles (confidentiality, integrity, availability, authentication, non-repudiation).
Capability to identify, contain, and remediate complex security incidents in a large, dynamic environment.