




**Job Description** Responsible for triaging and conducting initial analysis of security alerts, handling events generated by monitoring tools, executing standard procedures for incident analysis and response, as well as logging, escalating, and tracking information security events and incidents. Works under supervision and follows predefined playbooks. Responsibilities 1 \- Perform triage of security events and alerts. 2 \- Execute technical first-response procedures (Analysis) based on playbooks. 3\- Classify and prioritize incidents according to criticality. 4\- Record evidence and maintain updated documentation. 5\- Escalate incidents as needed (to SOC N2/N3\). 6\- Ensure compliance with defined security SLAs and KPIs. 7\- Assist in continuous improvement activities within the monitoring process. Activities 1 \- Monitor alerts on SIEM, EDR, and other security systems consoles. 2 \- Validate false positives based on technical criteria. 3 \- Create and update tickets with complete information about handled events. 4 \- Conduct basic investigations (e.g.: IP, domain, hash lookups). 5 \- Execute simple scripts or commands for evidence collection. 6 \- Follow procedures for account lockout or asset isolation. 7 \- Gather and organize information for N2/N3 analysts. 8\- Maintain communication with infrastructure and support teams when necessary. 9\- Participate in quick meetings (daily) with the SOC team. 10\- Support the creation of operational security reports. **Qualifications** Knowledge 1 \- Basic knowledge of Windows/Linux operating systems. 2 \- Networking fundamentals (TCP/IP, ports, protocols). 3 \- Basic information security concepts (malware, phishing, vulnerability). 4 \- Familiarity with tools such as SIEM, EDR, firewall, and antivirus. 5\- Ability to read simple logs and analyze alerts. 6\- Good written communication skills for event documentation. 7 \- Desired: Understanding of MITRE ATT\&CK and incident handling. Desired Certifications 1 \- Microsoft SC\-900 (or equivalent in security fundamentals) 2 \- Introductory certifications such as Fortinet NSE 1\-2, or similar Desired Experience Duration: 1 to 2 years of experience in IT technical support or information security. Desired: Previous experience in environments handling incident response, infrastructure technical support, or network/system monitoring


