About The Position
XM Cyber is a global leader in hybrid cloud security. XM Cyber brings a new approach that uses the attacker’s perspective to find and remediate critical attack paths across on-premises and multi-cloud networks. The XM Cyber platform enables companies to rapidly prioritize and respond to cyber risks affecting their business-sensitive systems.
We are seeking a skilled SOC Analyst (Tier 1/2) to monitor, detect, and respond to security incidents while contributing to threat intelligence initiatives. The ideal candidate thrives in fast-paced environments and is passionate about cybersecurity.
Responsibilities:
SOC Operations:
- Monitor security alerts from SIEM, EDR, and other tools to identify and respond to threats.
- Perform triage, investigation, escalation, and incident response per playbooks.
- Analyze logs, network traffic, and endpoint data for anomalies.
- Document incidents, actions taken, and recommendations.
- Maintain SOC dashboards and reports.
Threat Intelligence & Continuous Improvement:
- Enrich monitoring with threat intelligence feeds and analysis.
- Track emerging threats, vulnerabilities, and TTPs.
- Develop and refine detection rules and threat-hunting methodologies.
Support SOC automation and tool optimization (e.g., SIEM tuning).
Requirements
- 1-3 years in a SOC or cybersecurity role (Tier 1/2)
- Hands-on experience with SIEM (Splunk, QRadar, Sentinel) and EDR tools
- Strong understanding of MITRE ATT&CK, cyber kill chain, and network security
- Familiarity with threat intelligence, OSINT, and scripting (Python, PowerShell)
Preferred Qualifications:
- Certifications: Security+, CEH, GCIH, GCTI
- Experience with SOAR platforms (e.g., Cortex XSOAR) and playbook automation
- Knowledge of cloud security monitoring tools (AWS, Azure, GCP)
- Malware analysis & reverse engineering exposure
- Strong communication, problem-solving, and multitasking skills
- Team-oriented with a proactive and analytical mindset.