Security Operations Center Analyst

BrainRocket European Union
Visa Sponsorship Relocation
Apply
AI Summary

Monitor and analyze security alerts, respond to incidents, and maintain detailed records. Requires 3+ years of experience in security operations, incident response, or threat monitoring. Strong knowledge of cybersecurity principles and threat vectors.

Key Highlights
Monitor security alerts and events
Respond to and manage security incidents
Maintain detailed records of security incidents
Technical Skills Required
SIEM tools (Splunk, Sentinel, QRadar, ELK) IDS/IPS, EDR, firewalls, and email/web security solutions Cloud security knowledge (AWS and Azure) Web protocols and application-layer attacks
Benefits & Perks
Learning and development opportunities
Relocation package
Private medical coverage
Time for proper rest
Teambuilding activities

Job Description


❗️Please note that this role is office based for Spain,Poland, Portugal, Serbia, Bulgaria & Armenia

❗️If you need to be relocated, we take care of the process.



BrainRocket is a global company creating end-to-end tech products for clients across Fintech, iGaming, and Marketing. Young, ambitious, and unstoppable, we've already taken Cyprus, Malta, Portugal, Poland, and Serbia by storm. Our BRO team consists of 1,300 bright minds creating innovative ideas and products. We don’t follow formats. We shape them. We build what works, launch it fast, and make sure it hits


.
We are looking for a talented Security Operations Center Analyst to join our Information Security tea

m.✅ Key Responsibiliti

es🔍 Monitoring and Analys

  • isMonitor security alerts and events using SIEM, IDS/IPS, firewalls, and other tool
  • s.Perform initial triage and analysis of security events to detect potential threats and vulnerabilitie
  • s.Investigate network traffic and system logs to identify suspicious or malicious activit

y.🚨 Incident Respon

  • seRespond to and manage security incidents in a timely and effective manne
  • r.Escalate incidents when necessary and coordinate response activities across team
  • s.Document all findings, steps taken, and outcomes clearl

y.🧾 Reporting & Continuous Improveme

  • ntMaintain detailed records of all security incidents and response action
  • s.Create and contribute to incident reports and SOC documentatio
  • n.Participate in post-incident reviews and help improve SOC procedures and playbook

s.✅ Requiremen

  • tsMinimum 3 years of experience in security operations, incident response, or threat monitorin
  • g.Strong knowledge of cybersecurity principles, threat vectors, and defense technique
  • s.Experience with SIEM tools (e.g., Splunk, Sentinel, QRadar, ELK
  • ).Familiarity with IDS/IPS, EDR, firewalls, and email/web security solution
  • s.Cloud security knowledge (AWS and Azure preferred
  • ).Understanding of web protocols and application-layer attack
  • s.Experience in security investigation and threat huntin
  • g.Familiarity with MITRE ATT&CK, Cyber Kill Chain, et
  • c.Strong communication skills and attention to detai

l.✅ Nice to Ha

  • veBachelor’s degree in Computer Science, Cybersecurity, or related fiel
  • d.Knowledge of compliance frameworks such as ISO27001, ISO27701, PCI DSS, GDPR, et


c.
✅ What We Of

fer🧑🏻 💻 Learning and development opportunities and interesting, challenging tas

ks.✈️ Relocation package (tickets, staying in a hotel for up to 2 weeks, and visa relocation support for our employees and their family member

s).📚 Opportunity to develop language skil

ls.🏥 Private medical covera

ge.🏝 Time for proper rest, with 22 non-business days per ye

ar.🤝 Teambuilding activiti


es.

Subscribe our newsletter

New Things Will Always Update Regularly