datatrota
Signup Login
Home Jobs Blog

L1 SOC Analyst at Cyber Dome

Cyber DomeLagos, Nigeria Networking and Tech Support
Full Time
Completely and exclusively focused on cyber security, CyberDome offers a full-service solution portfolio to meet all your security needs: Products, Audits, Integration Services, Managed Services and even Training. CyberDome is proud to be a security-focused, engineer-driven company that has successfully delivered solutions,in a wide variety of industry verticals, for over a decade. Thanks to this extensive activity, our security solutions are today more prevalent than ever, safeguarding millions of computers in organizations, enterprises and governments around the globe.

Role Summary

  • The L1 SOC Analyst provides first-line monitoring, triage, and incident escalation within the Security Operations Centre. 
  • The role focuses on continuous surveillance of security events, identifying suspicious activities, conducting basic investigation, and ensuring timely escalation to L2/L3 teams following approved playbooks and SLAs. 
  • The L1 Analyst is critical in maintaining 24/7 detection coverage and supporting the organization’s cybersecurity posture.

Key Responsibilities

Security Monitoring & Alert Handling

  • Monitor SIEM dashboards, alerts, and log sources in real-time (Securonix, Splunk, Rapid7 InsightIDR, qradar).
  • Perform initial triage of alerts based on severity and defined SOPs.
  • Validate false positives vs true positives using available tools.
  • Escalate incidents to L2/L3 and SOC Lead when thresholds are met.

Incident Response Support

  • Conduct first-level investigation of suspicious activity (e.g., brute force, malware detection, privilege misuse).
  • Gather evidence and document findings in JIRA.
  • Execute basic containment actions when permitted (e.g., isolate host, block IOC, disable account) following playbooks.

Log Management & Reporting

  • Review and analyze logs from endpoints, servers, cloud platforms, and applications.
  • Ensure all log sources are properly ingested and reporting successfully within the SIEM.
  • Generate daily SOC shift reports and handover documentation.

Threat Intelligence Consumption

  • Review threat intelligence feeds and correlate IOCs with observed alerts.
  • Report emerging or unusual patterns to L2/L3 teams for further analysis.

Compliance & Operational Duties

  • Adhere strictly to SOC SOPs, runbooks, and escalation matrices.
  • Maintain accurate documentation, incident timelines, and evidence.
  • Participate in rotating shifts (day/night/weekend).

Required Skills & Competencies

Technical Skills

  • Foundational understanding of cybersecurity concepts (CIA triad, attack vectors, malware categories).
  • Basic knowledge of Windows, Linux, and networking fundamentals (TCP/IP, DNS, VPN, HTTP).
  • Experience or familiarity with SIEM platforms (Securonix, Splunk, Rapid7 InsightIDR).
  • Ability to interpret logs from endpoints, servers, authentication systems, and cloud environments.
  • Basic understanding of MITRE ATT&CK (awareness level).

Soft Skills

  • Strong analytical and problem-solving abilities.
  • High attention to detail and accuracy.
  • Ability to work under pressure and within strict SLAs.
  • Excellent communication and documentation skills.
  • Ability to follow instructions and escalate promptly.

Key Performance Indicators (KPIs)

  • Accuracy of alert triage.
  • SLA adherence for response and escalation.
  • Quality and completeness of JIRA documentation.
  • Compliance with SOC processes and shift discipline.
  • Reduction in false-positive escalations through effective triage.

Tools & Technologies Familiarity (Preferred)

  • SIEM: Securonix, Splunk, Rapid7 InsightIDR
  • EDR: CrowdStrike, Sophos, Microsoft Defender for Endpoint
  • Ticketing: JIRA
  • Threat Intel: VirusTotal, AbuseIPDB, OTX, ANY.RUN

Method of Application

Signup to view application details. Signup Now
X

Send this job to a friend