L1 SOC Analyst

Job Category :

Posted 4 months ago

Job title : L1 SOC Analyst
Work Location: Remote (Applicable only for Poland candidates)
Experience: 1 year
Qualification: Bachelor’s Degree or equivalent work experience.

Roles and Responsibilities:

Malware Detection and Analysis:

  • Monitoring security alerts and logs to identify potential malware threats.
  • Performing initial analysis of suspicious files and network traffic to determine the nature and severity of malware incidents.

Incident Triage:

  • Prioritizing and classifying malware-related incidents based on their impact and severity.
  • Documenting incident details and maintaining accurate records of all actions taken.

Alert Handling:

  • Responding promptly to security alerts and incidents, following established procedures and protocols.
  • Escalating incidents to higher-level analysts or appropriate teams when necessary.

Threat Mitigation:

  • Assisting in the containment and eradication of malware infections.
  • Collaborating with L2 and L3 analysts to implement countermeasures and remediation strategies.


  • Preparing detailed incident reports, including findings, actions taken, and recommendations for improving security measures.
  • Sharing insights and trends related to malware threats with the SOC team and management.

Continuous Monitoring:

  • Conducting continuous monitoring of network and system traffic for indicators of compromise (IOCs).
  • Staying up to date with emerging malware threats, techniques, and evasion tactics.

Documentation and Knowledge Sharing:

  • Maintaining and updating documentation related to MalOps procedures and best practices.
  • Sharing knowledge and provide guidance to junior analysts as needed.

Required Skills:

  • Bachelor’s degree in a relevant field or equivalent work experience.
  • Proficiency in the English language.
  • Proven experience in a SOC or IT security role, with a specific focus on malware analysis and incident response.
  • Familiarity with malware analysis tools, antivirus solutions, and SIEM platforms.
  • Knowledge of common malware families, attack vectors, and evasion techniques.
  • Strong understanding of networking, operating systems, and security principles.
  • Relevant certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Incident Handler (GCIH) is a plus.
  • Excellent communication and teamwork skills.
  • Ability to work in a fast-paced and dynamic environment.

Apply here

Accepted file types: pdf, docx, doc, Max. file size: 10 MB.

Apply Online