SOC Analyst, Level 1 – Internship
Posted 127ds ago
Employment Information
Report this job
Job expired or something wrong with this job?
Job Description
SOC Analyst Level 1 monitoring and responding to security alerts in Hitachi's Security Operations Center. Ideal for candidates starting their cybersecurity careers, with training provided.
Responsibilities:
- Monitor and investigate security alerts using Splunk, Microsoft Sentinel, and Elastic
- Perform initial triage and analysis of security events and incidents
- Identify false positives and escalate confirmed threats to SOC Level 2 analysts
- Follow incident response playbooks and SOC procedures
- Document incidents, investigations, and actions taken
- Monitor logs across cloud and on-prem environments
- Assist with basic threat hunting and vulnerability monitoring
- Stay current with emerging cyber threats and attack techniques
- Participate in 24/7 SOC operations , including evening and night shifts
Requirements:
- Bachelor’s degree in Cybersecurity, IT, Computer Science, or related field (or equivalent experience, Students/Graduates can also apply)
- Basic understanding of networking concepts (TCP/IP, DNS, HTTP/HTTPS, firewalls)
- Knowledge of common threats (phishing, malware, brute-force, DDoS)
- Familiarity with SIEM concepts and log analysis
- Strong analytical and problem-solving skills
- Good written and verbal communication skills
- Willingness to work evening and night shifts
Benefits:
- Structured SOC onboarding and training
- Clear career progression (SOC Level 2 / Level 3)
- Exposure to real-world enterprise security incidents
- Supportive and collaborative team environment



















