Description

We are establishing a lean, cloud-hosted, open-source SOC/MDR platform designed to be revenue-generating, SOC2-aligned, globally standard, and cost-efficient.

The Security Operations & Threat Analyst will play a dual role in SOC operations and SOC/MDR implementation. The position is responsible for real-time monitoring, incident analysis, and incident response, while actively participating in SOC/MDR deployment, configuration, client requirement analysis, and security assessments.

This is a hands-on technical role aligned with BS23’s objective of building a scalable, commercially viable cybersecurity services practice.

Job Responsibilities

1. SOC/MDR Implementation & Configuration

  • Participate in end-to-end SOC/MDR implementation for internal and client environments.
  • Assist in Wazuh agent deployment, log onboarding, rule configuration, and alert tuning.
  • Configure log pipelines, dashboards, and monitoring policies.
  • Support integration of firewalls, servers, endpoints, and cloud logs into the SOC platform.
  • Assist in automation workflows to improve operational efficiency.
  • Validate detection coverage post-implementation.

2. SOC Monitoring & Incident Response

  • Monitor SIEM/EDR alerts (Wazuh-based SOC stack).
  • Perform log analysis, alert validation, and incident triage.
  • Investigate suspicious activities across endpoints, servers, network, and cloud logs.
  • Execute containment actions (IP blocking, endpoint isolation, IOC validation).
  • Escalate confirmed incidents with complete technical evidence.
  • Maintain case documentation in TheHive and ensure SLA compliance.

3. Client Requirement Analysis & Security Assessment

  • Assist in gathering and analyzing client security monitoring requirements.
  • Support infrastructure and exposure assessments prior to SOC onboarding.
  • Perform baseline security posture review and log source validation.
  • Contribute to technical documentation for client onboarding and service scope definition.

4. Threat Detection & Analysis

  • Support detection rule tuning and false-positive reduction.
  • Map incidents to MITRE ATT&CK framework.
  • Perform IOC enrichment and OSINT validation.
  • Improve detection logic under guidance of SOC Lead.

5. Network & Penetration Testing Support

  • Assist in network exposure assessment and segmentation review.
  • Support vulnerability validation and misconfiguration detection.
  • Participate in web application testing aligned with OWASP Top 10.
  • Conduct black-box testing using Burp Suite / OWASP ZAP.
  • Document findings with technical proof-of-concept and risk impact explanation.

6. Reporting & Documentation

  • Prepare incident summaries and technical assessment reports.
  • Maintain SOC documentation, playbooks, and configuration records.
  • Support executive-ready client reporting under supervision of SOC Lead.

 

Required Qualifications

  • Bachelor’s degree in Computer Science, Cybersecurity, or related field.
  • 3 to 5 years’ experience in SOC or cybersecurity operations.
  • Hands-on experience with SIEM/log analysis (Wazuh preferred).
  • Basic understanding of networking (TCP/IP, DNS, HTTP/HTTPS, firewalls).
  • Familiarity with OWASP Top 10 vulnerabilities.
  • Experience with Burp Suite / OWASP ZAP (basic to intermediate).
  • Understanding of incident response lifecycle and security monitoring workflows.

 

Life at Brain Station 23