More jobs:
Job Description & How to Apply Below
Skills:
Splunk, Incident Management, Networking
Roles and Responsibilities:
Monitor SIEM and security dashboards (Splunk, Phantom, Service Now, JIRA, Purview) for alerts and anomalies.
Follow playbook-driven procedures for event/alert triage and response.
Log, categorize, and document incidents in the ticketing system while maintaining ticket hygiene.
Escalate non-standard or complex alerts to the Cyber Response and Data Protection teams as per escalation thresholds.
Participate in structured handovers and ensure accurate documentation of incidents and actions taken.
Maintain strong communication and documentation practices.
Other related activities as required by management.
Skills Required:
Hands-on experience with SIEM tools, particularly Splunk
Strong understanding of Security Operations Center (SOC) processes
Experience in incident detection, analysis, and response
Knowledge of incident management and escalation procedures
Familiarity with networking concepts (TCP/IP, DNS, firewalls, proxies)
Experience using ticketing and workflow tools such as Service Now or JIRA
Ability to follow playbooks and standard operating procedures
Strong analytical and problem-solving skills
Attention to detail with a focus on accurate documentation
Ability to work in shift-based environments, if required
Education:
Bachelor's Degree in related field
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here:
×