Cyber Security (SOC) Analyst
UltraViolet CyberFull Time
Junior (1 to 2 years)
Key technologies and capabilities for this role
Common questions about this position
The role requires 1–3 years of experience in SOC, MDR, or IT security operations, with internships or equivalent experience in SaaS support acceptable for junior level.
Key skills include strong understanding of EDR/XDR operations, common attacker TTPs and MITRE ATT&CK framework, fast logs analysis in Kibana, experience with security tools like EDR, SIEM, SOAR, and strong communication skills.
The position follows a 5-day/8-hour schedule with flexibility for morning or afternoon shifts and weekend coverage.
This is a growth-oriented role with opportunities to advance into proactive threat hunting and advanced incident response, including collaboration with AI engineering to enhance automation.
Strong candidates have 1-3 years in SOC/MDR, expertise in EDR/XDR triage, knowledge of MITRE ATT&CK, experience with security tools and log analysis, plus excellent English communication for customer interactions.
Data protection and cybersecurity solutions provider
Acronis provides a range of solutions that combine data protection and cybersecurity to address various challenges related to safety, accessibility, privacy, authenticity, and security. Their products include antivirus software, backup services, disaster recovery options, and endpoint protection management. Acronis also utilizes AI-based antimalware and blockchain technology for data authentication, ensuring that data, applications, and systems are protected in any environment. What sets Acronis apart from its competitors is its comprehensive approach to cyber protection, which integrates multiple aspects of data security into a single platform. The company's goal is to ensure that users can trust their data is safe and accessible, while also maintaining privacy and authenticity.