About the job
Join our team as a SOC Analyst L1 through the i2i Traineeship Program, designed for fresh graduates and those with some experience in cybersecurity. This role offers an excellent opportunity to gain foundational knowledge in cybersecurity while receiving hands-on experience.
As part of the program, selected candidates will undergo a comprehensive three-day training covering essential topics such as Introduction to Cybersecurity, Network Setup, the SOC Environment, SIEM, and Attack and Detection Logging. Following this training, participants will engage in a 12-month hands-on attachment within our organization, providing real-world experience by working on live client scenarios.
During the attachment period, trainees will receive mentorship and the potential for direct employment as SOC L1 Analysts upon successful completion of the program.
Key Responsibilities:
- Provide 24/7 Level 1 support following established procedures after training by ITSO/ITSM.
- Conduct daily checks and schedule weekly automated/ad-hoc MVMS vulnerability scans on servers and network devices, troubleshooting and re-activating scans as necessary.
- Escalate security vulnerabilities to the Security Engineer for further action.
- Manage patching activities from the identification of vulnerabilities to successful remediation.
- Utilize Splunk Apps to monitor and escalate outstanding vulnerabilities as identified in various compliance scans.
- Maintain MVMS asset inventory management for onboarding and offboarding systems.
- Track quarterly patching status for CIO forums using Splunk apps.
- Conduct compliance audit scans as required.
- Perform ad-hoc Malware IOC scans as threats emerge.
- Monitor performance and update signatures in the Nessus application.
As a SOC Analyst L1, you will contribute to our cybersecurity team by:
- Gaining familiarity with IDS/IPS and firewall management.
- Understanding vulnerability assessment and penetration testing processes.
- Engaging in Unix, Windows, and web server security tasks.
- Building a solid foundation in Information Security concepts.
- Understanding networking concepts across layers 1-7.

