Sprytech Ltd is an established cyber security and emerging technology company based in London, UK, founded by experienced technocrats having many years of industry experience across the globe. Sprytech has started an India office based in Mumbai and is working to establish an AI/ML driven cybersecurity and digital threat analytics centre to enhance the security of industry and government organisations.
We at Sprytech, as cyber security industry experts, work collaboratively with universities and provide internships to MSc students. We are looking for a SOC Analyst to join our team to work on the newly set up SOC operations.
Application Process
Interested candidates are invited to submit their resume, cover letter, and portfolio of relevant projects to info@sprytech.uk. Please include examples of previous work, such as GitHub repositories or published papers, if applicable.
Last date of application: 30th June 2024
Start Date: 1st August 2024
Job Description
A Security Operations Center (SOC) Analyst plays a critical role in protecting an organization’s information systems by detecting, analyzing, and responding to cybersecurity threats. The job description for a SOC Analyst typically includes the following elements:
Key Responsibilities:
-
Continuously monitor security alerts from various sources (SIEM, IDS/IPS, firewalls, antivirus, etc.).
-
Analyze security incidents and events to identify potential threats and vulnerabilities.
-
Use threat intelligence to understand and anticipate cyber threats.
-
Respond to security incidents and alerts, performing initial triage and investigation.
-
Collaborate with other teams (IT, Network, Application) to contain and remediate security incidents.
-
Document and report on security incidents, findings, and actions taken.
-
Proactively search for potential threats and vulnerabilities within the network.
-
Use advanced tools and techniques to identify suspicious activities and anomalous behaviours.
-
Recommend and implement improvements to security policies, procedures, and controls.
-
Assist in the development and maintenance of incident response plans and playbooks.
-
Maintain accurate and detailed records of security incidents and investigations.
-
Prepare and present reports on security metrics, trends, and incidents to management.
-
Stay up to date with the latest cybersecurity threats, trends, and technologies.
Skills and Qualifications:
-
Proficiency with security information and event management (SIEM) systems.
-
Experience with intrusion detection/prevention systems (IDS/IPS), firewalls, and antivirus software.
-
Familiarity with network protocols, operating systems, and security architectures.
-
Strong analytical and problem-solving skills to assess and respond to security threats.
-
Ability to analyze large volumes of data and identify patterns or anomalies.
-
Excellent verbal and written communication skills.
-
Ability to explain technical issues to non-technical stakeholders.
Educational Requirements:
-
Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field, or equivalent work experience.
-
Relevant certifications such as CompTIA Security+, CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Professional), or GIAC certifications.
Experience:
-
1-3 years of experience in cybersecurity or a related field.
-
Experience in a SOC environment is a plus.