SOC Analyst Level 1

Location CO-Bogotá | CO-Barranquilla
Posted Date 5 days ago(2/12/2026 10:21 AM)
Job ID
2026-4457
# Positions
8
Category
ITO

Job Summary

The SOC Analyst is responsible for administering and supporting clients’ operating system environments according to best practices, while ensuring high levels of system availability and performance, oriented to support Security Threat incidents.

Responsibilities

  • Monitor security alerts using SIEM and SOC tools.
  • Perform initial alert triage and severity assessment.
  • Escalate confirmed incidents to Level 2 with proper documentation.
  • Support incident response activities following established playbooks.
  • Analyze basic logs and IOCs to validate alerts.
  • Maintain accurate ticket updates and documentation.
  • Collaborate with IT and Service Desk teams for remediation support.
  • Monitor system availability and report operational issues.
  • Follow SOPs and contribute improvement feedback.
  • Identify repetitive alerts and suggest automation opportunities.
  • Communicate clearly during incident handling.

 

#LI-SG1

Skills and Experience

Experience:

  • Minimum of 1+ years of experience in the related field.

Education:

  • Bachelor’s degree in Computer Science, Engineering, IT, or related field, or equivalent working experience.
  • CompTIA Security+ or Microsoft SC-200 knowledge (certification preferred).
  • Basic understanding of SOC fundamentals and cybersecurity concepts.

Technical Skills:

  • Basic knowledge of the ITIL v4 framework.
  • Basic understanding of infrastructure operations (backup/restore, antimalware, vulnerability, and patching concepts).
  • Basic knowledge of Microsoft Entra ID or Active Directory.
  • Familiar with cloud computing fundamentals.
  • Basic Windows administration (Windows Server 2019–2025 or equivalent exposure).
  • Basic networking concepts (TCP/IP, DNS, ports, protocols).
  • Introductory exposure to Linux environments.
  • Basic understanding of virtualization concepts (e.g., VMware).
  • Familiar with Microsoft 365 and email security concepts.
  • Basic awareness of Disaster Recovery principles.
  • Introductory knowledge of the Security Incident Management lifecycle.
  • Familiarity with security technologies such as SIEM, EDR, Firewall, IDS/IPS (hands-on not mandatory).
  • Basic understanding of cybersecurity frameworks (NIST, CIS Controls, ISO 27001) is a plus.
  • Ability to review and triage security alerts following documented procedures.
  • Basic log analysis from common sources (endpoints, servers, cloud platforms, network devices).
  • Awareness of IOC concepts and entry-level threat analysis.

Additional Requirements (depending on role):

  • Excellent communication skills.
  • On-call availability.
  • Flexible schedules

Required Technical Proficiencies:

  • Monitoring & analysis tools
  • Incident Response and Handling Techniques
  • Malware analysis

 

 

Language Skills:

  • English – Spanish Language (Oral and writing 85 % or higher), (B2+ or above).

 

#LI-SG1

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed