line of digital defence, the SOC Analyst L1 is responsible for the continuous, real-time monitoring of our security landscape to protect sensitive financial data and critical infrastructure from emerging threats. You will perform the vital initial triage of security alerts, distinguishing between routine anomalies and high-risk incidents—such as phishing attempts or unauthorized access—ensuring rapid escalation to senior responders when necessary. Operating within a high-stakes, 24/7 banking environment, your role is essential in maintaining regulatory compliance, preventing operational disruption, and upholding the security standards that guarantee our customers’ trust.
Key responsibilities:
Real-Time Security Monitoring: Conduct continuous monitoring of the bank’s SIEM (Security Information and Event Management) and EDR (Endpoint Detection and Response) consoles to identify suspicious activity across the network.
Incident Triage & Classification: Perform the initial assessment of security alerts to determine their severity, validity, and potential impact on banking operations (e.g., distinguishing a false positive from a legitimate brute-force attack).
Phishing & Email Analysis: Investigate reported suspicious emails and potential “Business Email Compromise” (BEC) attempts targeting bank employees or customers.
Alert Escalation: Ensure timely and accurate escalation of verified high-priority threats to Level 2 Analysts according to the bank’s internal Serv