This onsite role provides the first line of operational support across Security and Network domains—triaging security alerts, monitoring network availability, executing SOP-driven actions, and escalating effectively to specialised L2/L3 teams. Key Responsibilities: Apply Security (50%): SIEM/EDR monitoring, IOC enrichment, phishing triage, basic containment actions, ticket management, SOAR playbook execution. Network (50%): NMS monitoring, link/device health checks, first-line diagnostics, vendor/ISP coordination, standard changes. Operational Excellence: Maintain run-books, contribute to KB, ensure SLA adherence, and complete thorough shift handovers. Cross-Functional Coordination: Collaborate with Incident Response, Network Engineering, Cloud, and Service Desk. Must-Have Skills: Security: SIEM/EDR basics, malware/phishing fundamentals, identity and endpoint hygiene basics. Networking: TCP/IP, VLANs, routing basics, VPNs, Wi-Fi basics, firewall fundamentals. Tooling: ServiceNow/Jira; SolarWinds/PRTG; Sentinel/Splunk/QRadar; Defender/CrowdStrike; basic SOAR familiarity. Process: ITIL® incident/change, SOP adherence, documentation discipline. Soft Skills: Clear communication, prioritizations, collaboration in shift-based environment. Preferred Certifications: Security (Security+, SC-200, CEH) and/or network (CCNA, Network+) credential; ITIL® 4 Foundation is a plus. Key Performance Indicator: MTTA, triage accuracy, FCR for run-book cases, escalation hygiene, playbook adherence, and proactive detection ratio.