Key responsibilities & AccountabilitiesThreat Analysis & Triage Track and investigate security alerts, use threat intelligence, escalate complex cases, and keep informed on emerging threats. Incident Handling: Follow SOC playbooks, assist in containment/remediation of low-complexity threats, and document case handoffs. Detection Optimization: Provide input to tune detection rules, minimize false positives, and document common events for operational efficiency. Collaboration: Support 24/7 SOC operations, team meetings, and participate in shift handovers. Skills & AbilityRequiredFamiliarity with SIEM, EDR, XDR tools Basic TCP/IP, security protocols, Microsoft 365, Windows/Linux/macOS fundamentals Experience with log analysis and incident triage Strong analytical/problem-solving skills Ability to work under pressure with attention to detail PreferredBachelors in Cybersecurity, Computer Science, or related field (or equivalent experience) Security certifications (Security+, CySA+, eCIR, BTL1, CDSA, or equivalent) Excellent written and verbal communication.