Job Purpose: The L1 SOC Analyst provides the first line of defense by monitoring alerts, performing initial triage (systematic evaluation, prioritization, and response to security alerts.) and escalating incidents as per SOPs and SLAs. Key Responsibilities: • Monitor SIEM, SOAR, EDR, and security dashboards 24x7. • Validate and triage security alerts. • Escalate potential incidents to L2 with proper documentation. • Track incident tickets and ensure SLA compliance. • Maintain situational awareness by tracking known threats. • Perform log analysis and simple threat correlation. Skills & Competencies: • Knowledge of networking basics (TCP/IP, DNS, HTTP, VPN). • Understanding of common threats (malware, phishing, brute-force, insider). • Familiarity with SIEM (Wazuh, Splunk, QRadar etc.). • Strong attention to detail and documentation. • Willing to learn continuously Qualifications: • 6-12 months of experience in security monitoring. • Certifications: Industry recognized certificates like Certified SOC Analyst CompTIA Security+ or Microsoft SC-200 etc Environmental Conditions: • Willing to Work in shifts in 24x7 environment