Overview:
We are seeking a skilled and motivated SOC Analyst with expertise that bridges the gap between L1 and L2 roles. The ideal candidate will have a solid foundation in security monitoring and incident response, along with hands-on experience in advanced threat analysis and proactive security measures. Proficiency in SIEM tools (e.g., Splunk), the MITRE ATT&CK framework, Cyber Kill Chain, and a strong understanding of vulnerabilities and threat management are essential.
Key Responsibilities
Monitor, analyze, and triage security alerts using SIEM tools like Splunk to identify and assess threats.
Conduct initial investigations and provide in-depth analysis of security incidents to determine the scope and impact.
Utilize the MITRE ATT&CK framework to identify and correlate adversary tactics, techniques, and procedures (TTPs).
Perform log correlation, packet analysis, and threat detection across diverse environments.
Manage vulnerabilities by assessing their impact, prioritizing remediation, and coordinating mitigation efforts.
Develop and fine-tune detection use cases, playbooks, and incident response workflows.
Conduct proactive threat hunting using SIEM and endpoint detection tools to identify unknown threats.
Leverage the Cyber Kill Chain to enhance detection, response, and prevention strategies.
Collaborate with cross-functional teams to implement security controls and ensure best practices are followed.
Document and report on incidents, including root cause analysis and actionable recommendations for improvement.
Required Skills and Experience:
2–5 years of hands-on experience in a SOC or similar cybersecurity role.
Proficiency in using SIEM tools (preferably Splunk) for monitoring, log analysis, and incident investigation.
Strong knowledge of the MITRE ATT&CK framework and the Cyber Kill Chain.
Understanding of common attack vectors, malware, threat actors, and vulnerability management processes.
Familiarity with scripting languages (e.g., Python, PowerShell) for automating security tasks is a plus.
Strong analytical and problem-solving skills with the ability to handle complex incidents.
Knowledge of forensic tools and techniques is an advantage.
Preferred Certifications:
CompTIA Security+
Splunk Core Certified User/Power User
GIAC Certified Incident Handler (GCIH)
MITRE ATT&CK Defender (MAD)
Certified Ethical Hacker (CEH)
Who We Are We have been using our skills and experience to help mobile service providers and vendors design and build brilliant mobile data networks that delight their users since 1999. Today the Flint team combines decades of telecoms and networking experience, coupled with the business insight, project management skills and resourcing capabilities that make mobile data projects happen quickly and efficiently. Although our industry has changed dramatically since Flint was founded, we have kept the same core values: Specialist – we provide specialist people, projects and training Timely – we have the expertise and resources you need, when you need them Flexible – we build the right team for the project, every time Value for money – we deliver value by getting it right first time Cutting edge – we have a deep knowledge of current, new and emerging technologies Independent – we’re not tied to specific vendors or systems We do business in over 20 countries around the world, delivering our services to Tier 1 and Tier 2 mobile network operators and vendors through three specialized business divisions: Flint Projects – delivery of projects and solutions for mobile networks, from concept through to acceptance Flint Specialists – highly skilled professionals and teams that enable mobile projects and solutions worldwide Flint Academy – tailored technical training for service providers and vendors.