Security Operations Center Analyst

BrainRocket European Union
Visa Sponsorship Relocation
Apply
AI Summary

BrainRocket is seeking a Security Operations Center Analyst to join their Information Security team. The ideal candidate will have a strong background in security operations, incident response, and threat monitoring. The role involves monitoring security alerts, investigating incidents, and maintaining detailed records of security incidents.

Key Highlights
Monitor security alerts and events using SIEM, IDS/IPS, firewalls, and other tools
Investigate network traffic and system logs to identify suspicious or malicious activity
Respond to and manage security incidents in a timely and effective manner
Technical Skills Required
SIEM Splunk Sentinel QRadar ELK IDS/IPS EDR firewalls email/web security solutions AWS Azure web protocols application-layer attacks MITRE ATT&CK Cyber Kill Chain
Benefits & Perks
Relocation package
Learning and development opportunities
Private medical coverage
Time for proper rest (22 non-business days per year)
Teambuilding activities
Opportunity to develop language skills

Job Description


❗️Please note that this role is office based for Spain,Poland, Portugal, Serbia, Bulgaria & Armenia

❗️If you need to be relocated, we take care of the process.


BrainRocket is a global company creating end-to-end tech products for clients across Fintech, iGaming, and Marketing. Young, ambitious, and unstoppable, we've already taken Cyprus, Malta, Portugal, Poland, and Serbia by storm. Our BRO team consists of 1,300 bright minds creating innovative ideas and products. We don’t follow formats. We shape them. We build what works, launch it fast, and make sure it hits.


We are looking for a talented Security Operations Center Analyst to join our Information Security team.

Key Responsibilities

🔍 Monitoring and Analysis

  • Monitor security alerts and events using SIEM, IDS/IPS, firewalls, and other tools.
  • Perform initial triage and analysis of security events to detect potential threats and vulnerabilities.
  • Investigate network traffic and system logs to identify suspicious or malicious activity.

🚨 Incident Response

  • Respond to and manage security incidents in a timely and effective manner.
  • Escalate incidents when necessary and coordinate response activities across teams.
  • Document all findings, steps taken, and outcomes clearly.

🧾 Reporting & Continuous Improvement

  • Maintain detailed records of all security incidents and response actions.
  • Create and contribute to incident reports and SOC documentation.
  • Participate in post-incident reviews and help improve SOC procedures and playbooks.

Requirements

  • Minimum 4 years of experience in security operations, incident response, or threat monitoring.
  • Strong knowledge of cybersecurity principles, threat vectors, and defense techniques.
  • Experience with SIEM tools (e.g., Splunk, Sentinel, QRadar, ELK).
  • Familiarity with IDS/IPS, EDR, firewalls, and email/web security solutions.
  • Cloud security knowledge (AWS and Azure preferred).
  • Understanding of web protocols and application-layer attacks.
  • Experience in security investigation and threat hunting.
  • Familiarity with MITRE ATT&CK, Cyber Kill Chain, etc.
  • Strong communication skills and attention to detail.

Nice to Have

  • Bachelor’s degree in Computer Science, Cybersecurity, or related field.
  • Knowledge of compliance frameworks such as ISO27001, ISO27701, PCI DSS, GDPR, etc.


What We Offer

🧑🏻 💻 Learning and development opportunities and interesting, challenging tasks.

✈️ Relocation package (tickets, staying in a hotel for up to 2 weeks, and visa relocation support for our employees and their family members).

📚 Opportunity to develop language skills.

🏥 Private medical coverage.

🏝 Time for proper rest, with 22 non-business days per year.

🤝 Teambuilding activities.



Subscribe our newsletter

New Things Will Always Update Regularly