Resume and JobRESUME AND JOB
IBM logo

Senior SOC Analyst

IBM

Software and Technology Jobs

Senior SOC Analyst

full-timePosted: Dec 11, 2025

Job Description

Senior SOC Analyst

📋 Job Overview

The Senior SOC Analyst at IBM is responsible for advanced analysis, deep-dive investigation, and resolution of security incidents escalated from L1 or automated systems. They work closely with Client CDC and engineering teams to provide contextual threat analysis, enrichment, and remediation, ensuring complex incidents are accurately classified, mitigated, and documented while identifying opportunities to improve detection and response processes.

📍 Location: BUDAPEST, HU (Remote/Hybrid)

💼 Career Level: Professional

🎯 Key Responsibilities

  • Validate escalations from L1 and ensure incident creation is accurate
  • Analyse complex e-mail cases or hotline escalations that fall outside SOPs
  • Conduct advanced phishing/malware analysis using sandboxing, threat intelligence, and enrichment tools
  • Provide verdicts and tailored communication to end users beyond template responses
  • Identify phishing campaigns, recurring indicators, and suggest proactive blocking measures
  • Perform in-depth triage and investigation of CrowdStrike incidents
  • Correlate alerts with endpoint telemetry, network data, and threat intelligence
  • Take pre-approved remediation actions via Logic Apps
  • Conduct root-cause analysis on recurring incidents
  • Propose whitelist/blacklist updates to reduce false positives
  • Analyse suspicious e-mails flagged by EOP, including attachment and URL analysis
  • Define and initiate mitigation measures (IoC blacklisting, proxy blocking, sandbox validation)
  • Classify incident severity and escalate critical events to CDC
  • Provide intelligence reporting on evolving e-mail threats
  • Independently analyse SIEM alerts, correlate across data sources, and enrich with TI feeds
  • Conduct root-cause analysis and propose detection improvements
  • Take pre-approved remediation actions using automation playbooks
  • Provide prioritization and trend analysis reports to Client CDC
  • Collaborate with engineering to enhance detection rules and SOPs
  • Mentor L1 analysts by providing feedback and training

✅ Required Qualifications

  • Bachelor’s degree in IT, Cybersecurity, or related field
  • Security certifications (e.g., GIAC GCIH, Microsoft SC-200, CySA+, or similar)
  • 2–5 years of SOC analyst or incident response experience

🛠️ Required Skills

  • Solid understanding of cyber kill chain, MITRE ATT&CK, and incident response
  • Proficiency with SIEM (Microsoft Sentinel)
  • Proficiency with EDR (CrowdStrike)
  • Proficiency with SOAR automation workflows
  • Hands-on experience with e-mail security
  • Hands-on experience with sandboxing
  • Hands-on experience with phishing analysis
  • Knowledge of malware behavior
  • Knowledge of threat intelligence sources
  • Knowledge of IOC enrichment
  • Strong analytical skills
  • Strong investigative skills
  • Ability to handle complex cases
  • Effective communication with technical and non-technical stakeholders

🎁 Benefits & Perks

  • Opportunity to learn and develop career
  • Encouragement to be courageous and experiment
  • Continuous trust and support in an inclusive environment
  • Flexible working patterns
  • Equal-opportunity employment

Locations

  • BUDAPEST, HU, India (Remote)

Salary

Estimated Salary Rangemedium confidence

2,500,000 - 4,200,000 INR / yearly

Source: ai estimated

* This is an estimated range based on market data and may vary based on experience and qualifications.

Skills Required

  • Solid understanding of cyber kill chain, MITRE ATT&CK, and incident responseintermediate
  • Proficiency with SIEM (Microsoft Sentinel)intermediate
  • Proficiency with EDR (CrowdStrike)intermediate
  • Proficiency with SOAR automation workflowsintermediate
  • Hands-on experience with e-mail securityintermediate
  • Hands-on experience with sandboxingintermediate
  • Hands-on experience with phishing analysisintermediate
  • Knowledge of malware behaviorintermediate
  • Knowledge of threat intelligence sourcesintermediate
  • Knowledge of IOC enrichmentintermediate
  • Strong analytical skillsintermediate
  • Strong investigative skillsintermediate
  • Ability to handle complex casesintermediate
  • Effective communication with technical and non-technical stakeholdersintermediate

Required Qualifications

  • Bachelor’s degree in IT, Cybersecurity, or related field (experience)
  • Security certifications (e.g., GIAC GCIH, Microsoft SC-200, CySA+, or similar) (experience)
  • 2–5 years of SOC analyst or incident response experience (experience)

Responsibilities

  • Validate escalations from L1 and ensure incident creation is accurate
  • Analyse complex e-mail cases or hotline escalations that fall outside SOPs
  • Conduct advanced phishing/malware analysis using sandboxing, threat intelligence, and enrichment tools
  • Provide verdicts and tailored communication to end users beyond template responses
  • Identify phishing campaigns, recurring indicators, and suggest proactive blocking measures
  • Perform in-depth triage and investigation of CrowdStrike incidents
  • Correlate alerts with endpoint telemetry, network data, and threat intelligence
  • Take pre-approved remediation actions via Logic Apps
  • Conduct root-cause analysis on recurring incidents
  • Propose whitelist/blacklist updates to reduce false positives
  • Analyse suspicious e-mails flagged by EOP, including attachment and URL analysis
  • Define and initiate mitigation measures (IoC blacklisting, proxy blocking, sandbox validation)
  • Classify incident severity and escalate critical events to CDC
  • Provide intelligence reporting on evolving e-mail threats
  • Independently analyse SIEM alerts, correlate across data sources, and enrich with TI feeds
  • Conduct root-cause analysis and propose detection improvements
  • Take pre-approved remediation actions using automation playbooks
  • Provide prioritization and trend analysis reports to Client CDC
  • Collaborate with engineering to enhance detection rules and SOPs
  • Mentor L1 analysts by providing feedback and training

Benefits

  • general: Opportunity to learn and develop career
  • general: Encouragement to be courageous and experiment
  • general: Continuous trust and support in an inclusive environment
  • general: Flexible working patterns
  • general: Equal-opportunity employment

Target Your Resume for "Senior SOC Analyst" , IBM

Get personalized recommendations to optimize your resume specifically for Senior SOC Analyst. Takes only 15 seconds!

AI-powered keyword optimization
Skills matching & gap analysis
Experience alignment suggestions

Check Your ATS Score for "Senior SOC Analyst" , IBM

Find out how well your resume matches this job's requirements. Get comprehensive analysis including ATS compatibility, keyword matching, skill gaps, and personalized recommendations.

ATS compatibility check
Keyword optimization analysis
Skill matching & gap identification
Format & readability score

Tags & Categories

ConsultingConsulting

Answer 10 quick questions to check your fit for Senior SOC Analyst @ IBM.

Quiz Challenge
10 Questions
~2 Minutes
Instant Score

Related Books and Jobs

No related jobs found at the moment.

IBM logo

Senior SOC Analyst

IBM

Software and Technology Jobs

Senior SOC Analyst

full-timePosted: Dec 11, 2025

Job Description

Senior SOC Analyst

📋 Job Overview

The Senior SOC Analyst at IBM is responsible for advanced analysis, deep-dive investigation, and resolution of security incidents escalated from L1 or automated systems. They work closely with Client CDC and engineering teams to provide contextual threat analysis, enrichment, and remediation, ensuring complex incidents are accurately classified, mitigated, and documented while identifying opportunities to improve detection and response processes.

📍 Location: BUDAPEST, HU (Remote/Hybrid)

💼 Career Level: Professional

🎯 Key Responsibilities

  • Validate escalations from L1 and ensure incident creation is accurate
  • Analyse complex e-mail cases or hotline escalations that fall outside SOPs
  • Conduct advanced phishing/malware analysis using sandboxing, threat intelligence, and enrichment tools
  • Provide verdicts and tailored communication to end users beyond template responses
  • Identify phishing campaigns, recurring indicators, and suggest proactive blocking measures
  • Perform in-depth triage and investigation of CrowdStrike incidents
  • Correlate alerts with endpoint telemetry, network data, and threat intelligence
  • Take pre-approved remediation actions via Logic Apps
  • Conduct root-cause analysis on recurring incidents
  • Propose whitelist/blacklist updates to reduce false positives
  • Analyse suspicious e-mails flagged by EOP, including attachment and URL analysis
  • Define and initiate mitigation measures (IoC blacklisting, proxy blocking, sandbox validation)
  • Classify incident severity and escalate critical events to CDC
  • Provide intelligence reporting on evolving e-mail threats
  • Independently analyse SIEM alerts, correlate across data sources, and enrich with TI feeds
  • Conduct root-cause analysis and propose detection improvements
  • Take pre-approved remediation actions using automation playbooks
  • Provide prioritization and trend analysis reports to Client CDC
  • Collaborate with engineering to enhance detection rules and SOPs
  • Mentor L1 analysts by providing feedback and training

✅ Required Qualifications

  • Bachelor’s degree in IT, Cybersecurity, or related field
  • Security certifications (e.g., GIAC GCIH, Microsoft SC-200, CySA+, or similar)
  • 2–5 years of SOC analyst or incident response experience

🛠️ Required Skills

  • Solid understanding of cyber kill chain, MITRE ATT&CK, and incident response
  • Proficiency with SIEM (Microsoft Sentinel)
  • Proficiency with EDR (CrowdStrike)
  • Proficiency with SOAR automation workflows
  • Hands-on experience with e-mail security
  • Hands-on experience with sandboxing
  • Hands-on experience with phishing analysis
  • Knowledge of malware behavior
  • Knowledge of threat intelligence sources
  • Knowledge of IOC enrichment
  • Strong analytical skills
  • Strong investigative skills
  • Ability to handle complex cases
  • Effective communication with technical and non-technical stakeholders

🎁 Benefits & Perks

  • Opportunity to learn and develop career
  • Encouragement to be courageous and experiment
  • Continuous trust and support in an inclusive environment
  • Flexible working patterns
  • Equal-opportunity employment

Locations

  • BUDAPEST, HU, India (Remote)

Salary

Estimated Salary Rangemedium confidence

2,500,000 - 4,200,000 INR / yearly

Source: ai estimated

* This is an estimated range based on market data and may vary based on experience and qualifications.

Skills Required

  • Solid understanding of cyber kill chain, MITRE ATT&CK, and incident responseintermediate
  • Proficiency with SIEM (Microsoft Sentinel)intermediate
  • Proficiency with EDR (CrowdStrike)intermediate
  • Proficiency with SOAR automation workflowsintermediate
  • Hands-on experience with e-mail securityintermediate
  • Hands-on experience with sandboxingintermediate
  • Hands-on experience with phishing analysisintermediate
  • Knowledge of malware behaviorintermediate
  • Knowledge of threat intelligence sourcesintermediate
  • Knowledge of IOC enrichmentintermediate
  • Strong analytical skillsintermediate
  • Strong investigative skillsintermediate
  • Ability to handle complex casesintermediate
  • Effective communication with technical and non-technical stakeholdersintermediate

Required Qualifications

  • Bachelor’s degree in IT, Cybersecurity, or related field (experience)
  • Security certifications (e.g., GIAC GCIH, Microsoft SC-200, CySA+, or similar) (experience)
  • 2–5 years of SOC analyst or incident response experience (experience)

Responsibilities

  • Validate escalations from L1 and ensure incident creation is accurate
  • Analyse complex e-mail cases or hotline escalations that fall outside SOPs
  • Conduct advanced phishing/malware analysis using sandboxing, threat intelligence, and enrichment tools
  • Provide verdicts and tailored communication to end users beyond template responses
  • Identify phishing campaigns, recurring indicators, and suggest proactive blocking measures
  • Perform in-depth triage and investigation of CrowdStrike incidents
  • Correlate alerts with endpoint telemetry, network data, and threat intelligence
  • Take pre-approved remediation actions via Logic Apps
  • Conduct root-cause analysis on recurring incidents
  • Propose whitelist/blacklist updates to reduce false positives
  • Analyse suspicious e-mails flagged by EOP, including attachment and URL analysis
  • Define and initiate mitigation measures (IoC blacklisting, proxy blocking, sandbox validation)
  • Classify incident severity and escalate critical events to CDC
  • Provide intelligence reporting on evolving e-mail threats
  • Independently analyse SIEM alerts, correlate across data sources, and enrich with TI feeds
  • Conduct root-cause analysis and propose detection improvements
  • Take pre-approved remediation actions using automation playbooks
  • Provide prioritization and trend analysis reports to Client CDC
  • Collaborate with engineering to enhance detection rules and SOPs
  • Mentor L1 analysts by providing feedback and training

Benefits

  • general: Opportunity to learn and develop career
  • general: Encouragement to be courageous and experiment
  • general: Continuous trust and support in an inclusive environment
  • general: Flexible working patterns
  • general: Equal-opportunity employment

Target Your Resume for "Senior SOC Analyst" , IBM

Get personalized recommendations to optimize your resume specifically for Senior SOC Analyst. Takes only 15 seconds!

AI-powered keyword optimization
Skills matching & gap analysis
Experience alignment suggestions

Check Your ATS Score for "Senior SOC Analyst" , IBM

Find out how well your resume matches this job's requirements. Get comprehensive analysis including ATS compatibility, keyword matching, skill gaps, and personalized recommendations.

ATS compatibility check
Keyword optimization analysis
Skill matching & gap identification
Format & readability score

Tags & Categories

ConsultingConsulting

Answer 10 quick questions to check your fit for Senior SOC Analyst @ IBM.

Quiz Challenge
10 Questions
~2 Minutes
Instant Score

Related Books and Jobs

No related jobs found at the moment.