Job Description
What success looks like in this role:
Monitor SIEM dashboards and security alerts on a 24/7 basis (as applicable).Perform initial triage and classification of alerts to determine true positives, false positives, and severity levels.Escalate incidents to L2/L3 analysts based on established procedures and thresholds.Document alert findings, actions taken, and escalation notes in the ticketing system.Conduct basic investigations such as log analysis, IP/domain reputation checks, and user activity review.Follow Incident Response playbooks and SOPs for consistent handling of events.Assist in monitoring endpoint, network, and cloud security tools as part of SOC operations.Support threat hunting and continuous improvement activities led by senior analysts.Maintain awareness of common cyber threats and security best practices.You will be successful in this role if you have:
3+ years ...
Ready to Apply?
Take the next step in your AI career. Submit your application to Unisys today.
Submit Application