Associate SOC Analyst, Security Operations (SecOps) – EMEA
Northern Trust View all jobs
- Limerick
- Permanent
- Full-time
- Monitoring, analysing, and triaging security alerts generated by SOC tooling (e.g., SIEM, EDR, identity, email, and cloud security platforms).
- Performing initial investigation of alerts and suspicious activity using documented SOC playbooks and standard operating procedures.
- Determining alert validity, impact, and severity, and escalate confirmed or high‑risk incidents in line with defined SOC escalation paths.
- Supporting incident response activities by collecting evidence, validating indicators of compromise, and maintaining accurate investigation timelines.
- Executing approved containment or response actions when directed (e.g., user account containment, endpoint isolation, blocking malicious indicators).
- Maintaining high‑quality case documentation within SOC ticketing and case management systems.
- Participating in shift handovers to ensure continuity of monitoring and investigations across regions.
- Supporting detection quality activities, including alert validation, false‑positive analysis, and basic tuning tasks.
- Collaborating with IT, identity, cloud, and regional security stakeholders during investigations.
- Contributing to SOC operational metrics, reporting, and continuous improvement initiatives.
- A drive to develop a career path in Cyber Security.
- Foundational understanding of cybersecurity threats and attack types, including phishing, malware, credential compromise, and basic network attacks.
- Knowledge of networking concepts (TCP/IP, DNS, HTTP/S) and identity/authentication fundamentals.
- Familiarity with at least one SOC‑relevant security domain (endpoint, identity, email, network, or cloud security).
- Demonstrated ability to follow structured SOC investigation processes and document findings clearly and accurately.
- Basic querying or scripting skills (e.g., KQL, SQL, PowerShell, Python) are advantageous.
- Strong analytical mindset with attention to detail and an ability to prioritise alerts effectively.
- Clear written and verbal communication skills suitable for operational and incident‑related updates.
- Willingness and ability to work shift patterns as part of a 24x7 SOC environment.
- Strong sense of responsibility and ownership for assigned alerts and investigations.
- Curiosity and a continuous‑learning mindset, with openness to coaching and feedback.
- Demonstrated ability to remain calm, structured, and professional during high‑severity or time‑sensitive incidents.
- Exposure to SOC tooling such as SIEM platforms, EDR solutions, or cloud security monitoring tools.
- Experience working with incident, alert, or service‑management ticketing systems.
- Awareness of common attacker tactics, techniques, and procedures (TTPs) aligned to SOC investigations.
- Previous experience in a SOC or related areas such as IT operations/support is beneficial.
- Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related discipline, or equivalent practical experience.