L1 SOC Analyst - Rome
Descrizione dell'offerta
Job Role / Responsibilities
As a Level 1 SOC Analyst, you will act as the first line of defense, responsible for continuous monitoring, triage, and initial investigation of security events. This role is critical in maintaining security posture and ensuring only high-quality, actionable alerts progress through the SOC pipeline.
Primary Duties/Responsibilities Include
- Monitor security events across our security ecosystem, including:
- Microsoft Sentinel
- Perform alert triage with clear analytical judgement:
- Assign appropriate severity
- Conduct preliminary investigations:
- Identify IOCs, affected systems, attack vectors and potential business impact
- Apply frameworks such as MITRE ATT&CK, Cyber Kill Chain, and NIST IR lifecycle
- Maintain high-quality documentation and case notes within ServiceNow SIR
- Communicate effectively with internal teams and client stakeholders
- Contribute to continuous improvement through feedback, tuning suggestions, and knowledge sharing
- Demonstrate strong commitment to ongoing professional development
- SLA handling/management - Aspire to manage security events in accordance with applicable (response and resolution) SLA’s.
Desired Skills
- Demonstrable experience in IT or cybersecurity support, ideally within a SOC or monitoring environment
- Solid understanding of cybersecurity fundamentals and CIA principles
- Familiarity with SIEM, EDR/XDR, log analysis, and security monitoring workflows
- Working knowledge of MITRE ATT&CK and NIST IR processes
- Strong analytical and investigative thinking
- Excellent written and verbal communication skills
- Ability to operate independently within Tier 1 scope
- Ability to work effectively in a fast-paced environment and prioritize tasks accordingly
Certifications/Qualifications (preferred But Not Required)
- CompTIA Security+, ISC2, ISACA, SANS or equivalent