Position: SOC Analyst (Tier 1 / Tier 2 / Tier 3)
Location: US / UAE (Onsite & Offshore options available)
Employment Type: Full-time
About the Role
We are seeking motivated and skilled SOC Analysts to join our global Security Operations Center team supporting critical US and UAE projects. The SOC Analyst will be responsible for real-time monitoring, detection, investigation, and response to security incidents using industry-leading SIEM, SOAR, and Threat Intelligence platforms.
This is a unique opportunity to work on world-class cybersecurity projects, with exposure to diverse threat landscapes across multiple geographies.
Key Responsibilities
- Continuous monitoring of SIEM/SOAR platforms to detect security incidents and anomalies.
- Perform initial triage, classification, and escalation of alerts based on severity and impact.
- Investigate suspicious activity using logs, threat intel feeds, EDR, NDR, and other security tools.
- Support incident response activities – containment, eradication, recovery, and post-incident reporting.
- Conduct threat hunting and proactive analysis for emerging attack techniques (MITRE ATT&CK framework).
- Document incidents, maintain knowledge base, and update playbooks/runbooks.
- Collaborate with US and UAE project stakeholders for compliance, reporting, and operational alignment.
- Work in a 24x7 rotational shift environment (for offshore SOC roles).
Required Skills & Experience
- Hands-on experience with SIEM platforms (Splunk, IBM QRadar, ArcSight, LogRhythm, Elastic, Azure Sentinel, etc.).
- Knowledge of Endpoint Detection & Response (EDR), Network Security Monitoring (NDR), Threat Intelligence Platforms, and Vulnerability Management tools.
- Strong understanding of TCP/IP, firewalls, IDS/IPS, proxies, DNS, VPNs, authentication, and malware behavior.
- Familiarity with security frameworks & standards (NIST, MITRE ATT&CK, ISO 27001, CIS Controls).
- Analytical skills to investigate phishing, malware, insider threats, brute-force attempts, lateral movement, and cloud threats.
- Strong communication and documentation skills to interact with cross-border teams and clients.
Certifications (Preferred / Mandatory for Senior Roles)
- CompTIA Security+ / CySA+
- Certified SOC Analyst (CSA)
- EC-Council Certified Incident Handler (ECIH)
- Splunk Certified Power User / Admin
- Microsoft Security Operations Analyst (SC-200)
- GIAC (GCIA, GCED, GCIH) – Advantage for Tier 2/3
- OSCP/OSCE or equivalent – Advantage for senior threat hunters
Seniority Levels
- Tier 1 (Junior SOC Analyst): Alert monitoring, triage, ticketing, and escalation. (1–2 years exp.)
- Tier 2 (SOC Analyst): Incident investigation, forensics, and response coordination. (2–5 years exp.)
- Tier 3 (Senior SOC Analyst / Threat Hunter): Advanced threat hunting, malware analysis, playbook development, mentoring juniors. (5+ years exp.)
Preferred Qualifications
- Experience working in Managed Security Services (MSSP) or large enterprise SOC environments.
- Exposure to Cloud Security Monitoring (AWS, Azure, GCP).
- Hands-on knowledge of SOAR automation and playbook creation.
- Willingness to work in onsite client environments (US/UAE) if required.
What We Offer
- Opportunity to work on high-impact projects across US and UAE.
- Exposure to global threat intelligence and advanced SOC environments.
- Career growth through continuous learning & certification sponsorship.
- Competitive salary and relocation assistance (for onsite roles).
- Flexible onsite/offshore engagement models.