Job Description

What success looks like in this role:

  • Monitor SIEM dashboards and security alerts on a 24/7 basis (as applicable).
  • Perform initial triage and classification of alerts to determine true positives, false positives, and severity levels.
  • Escalate incidents to L2/L3 analysts based on established procedures and thresholds.
  • Document alert findings, actions taken, and escalation notes in the ticketing system.
  • Conduct basic investigations such as log analysis, IP/domain reputation checks, and user activity review.
  • Follow Incident Response playbooks and SOPs for consistent handling of events.
  • Assist in monitoring endpoint, network, and cloud security tools as part of SOC operations.
  • Support threat hunting and continuous improvement activities led by senior analysts.
  • Maintain awareness of common cyber threats and security best practices.
  • You will be successful in this role if you have:

  • 3+ years ...
  • Ready to Apply?

    Take the next step in your AI career. Submit your application to Unisys today.

    Submit Application