SOC Analyst, Level 1 – Internship

Posted 127ds ago

Employment Information

Education
Salary
Experience
Job Type

Report this job

Job expired or something wrong with this job?

Job Description

SOC Analyst Level 1 monitoring and responding to security alerts in Hitachi's Security Operations Center. Ideal for candidates starting their cybersecurity careers, with training provided.

Responsibilities:

  • Monitor and investigate security alerts using Splunk, Microsoft Sentinel, and Elastic
  • Perform initial triage and analysis of security events and incidents
  • Identify false positives and escalate confirmed threats to SOC Level 2 analysts
  • Follow incident response playbooks and SOC procedures
  • Document incidents, investigations, and actions taken
  • Monitor logs across cloud and on-prem environments
  • Assist with basic threat hunting and vulnerability monitoring
  • Stay current with emerging cyber threats and attack techniques
  • Participate in 24/7 SOC operations , including evening and night shifts

Requirements:

  • Bachelor’s degree in Cybersecurity, IT, Computer Science, or related field (or equivalent experience, Students/Graduates can also apply)
  • Basic understanding of networking concepts (TCP/IP, DNS, HTTP/HTTPS, firewalls)
  • Knowledge of common threats (phishing, malware, brute-force, DDoS)
  • Familiarity with SIEM concepts and log analysis
  • Strong analytical and problem-solving skills
  • Good written and verbal communication skills
  • Willingness to work evening and night shifts

Benefits:

  • Structured SOC onboarding and training
  • Clear career progression (SOC Level 2 / Level 3)
  • Exposure to real-world enterprise security incidents
  • Supportive and collaborative team environment