Junior SOC Analyst | SIEM | Alert Triage
Send a job offer directly to this candidate
Analytical and technically trained aspiring SOC Analyst with hands-on experience in log analysis, alert triage, incident investigation, and threat detection through practical lab environments and simulated attack scenarios. Proven ability to interpret complex datasets, identify anomalous patterns, and make structured escalation decisions developed through high-stakes operational engineering roles.
Recognised for disciplined investigation methodology, precise documentation, and rapid problem resolution under pressure. Currently strengthening defensive security expertise through certifications including ISC2 Certified in Cybersecurity, Security+, and Microsoft SC-200. Seeking to apply analytical and incident response capabilities within a Security Operations Centre environment.
Technical and analytical professional with experience in high-pressure operational environments requiring structured investigation, rapid decision-making, and precise escalation judgement. Previously worked in engineering and production leadership roles where I analysed live operational data, identified anomalies, investigated root causes, and coordinated cross-functional responses to prevent failures and maintain business continuity.
Developed strong investigative discipline, documentation accuracy, and prioritisation skills directly transferable to Security Operations Centre environments. Hands-on practical cybersecurity training includes analysing logs, triaging alerts, investigating simulated attacks, and identifying indicators of compromise using SIEM tools, network analysis, and structured incident response methodologies.