About you:
You are someone who wants to influence your own development. You’re looking for a company where you have the opportunity to pursue your interests and be able to grow professionally.
The SOC Shift Lead is a critical role within the Security Operations Center, responsible for coordinating and mentoring SOC Analysts to ensure efficient and effective monitoring, detection, and response to cybersecurity threats. This position requires a deep understanding of triage and incident response processes, with a focus on guiding analysts through complex investigations and ensuring adherence to incident response playbooks. The SOC Shift Lead acts as the primary escalation point during their shift, facilitating collaboration among team members, maintaining operational continuity, and driving continuous improvement in security practices.
You bring to Applaudo the following competencies:
- Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or a related discipline, or equivalent professional experience
- 3–5 years of hands-on experience in SOC operations, including triage, threat detection, and incident response.
- Demonstrated expertise in investigating security incidents and applying structured response protocols.
- Strong proficiency in using and optimizing tools like Chronicle SIEM/SOAR, FortiXDR, FortiSOAR, and threat intelligence platforms.
- Experience coordinating or mentoring SOC teams to ensure consistent and effective operations.
- Strong leadership and coordination abilities to guide SOC Analysts during shifts and ensure smooth operations.
- Critical thinking and problem-solving skills to analyze complex security incidents and make sound decisions under pressure.
- Excellent communication skills, both verbal and written, for briefing stakeholders, documenting incidents, and collaborating with team members.
- Adaptability and time management to prioritize tasks effectively and respond to evolving threats in a dynamic environment.
- Attention to detail to validate alerts, review triage outcomes, and maintain high-quality documentation.
- Advanced English (required).
- Desirable: CompTIA Security+, CySA+.
- Desirable: EC-Council Certified Incident Handler (ECIH).
- Desirable: Certified SOC Analyst (CSA)
- Desirable: SIEM certifications (e.g., Chronicle, Splunk Core Certified Power User, IBM QRadar Certified Specialist).
- Desirable: EDR/XDR certifications (e.g., CrowdStrike Certified Falcon Administrator, SentinelOne Certified Administrator).
You will be accountable for the following responsibilities:
- Coordinate SOC activities during the shift, ensuring the team’s tasks align with operational priorities.
- Conduct shift briefings and ensure comprehensive handovers to maintain operational continuity between shifts.
- Assign tasks to SOC Analysts based on the severity of incidents and individual expertise
- Oversee the triage, investigation, and resolution of security incidents, ensuring effective use of SOC tools.
- Serve as the primary escalation point for complex or high-priority incidents, ensuring timely and effective resolution.
- Ensure all incidents are handled according to established response playbooks, identifying opportunities to refine processes when needed.
- Validate the accuracy of alerts triaged by SOC Analysts, ensuring high-quality analysis and prioritization.
- Proactively identify opportunities for threat hunting or deeper analysis during downtime.
- Ensure the team leverages tools and other platforms for real-time threat detection and response.
- Provide mentorship and technical guidance to SOC Analysts, helping them develop expertise in triage, incident response, and threat detection.
- Lead on-the-job training sessions for new analysts, ensuring a smooth onboarding process.
- Share knowledge on emerging threats, tools, and techniques with the team to maintain a high level of operational readiness.
- Provide feedback on SOC workflows, playbooks, and incident handling procedures to improve efficiency and effectiveness.
- Ensure all incidents and activities are thoroughly documented in the incident management system, including key learnings and recommendations for improvement.
- Collaborate with the SOC Manager to optimize detection rules and workflows based on team feedback and threat trends.
- Act as the primary point of contact during the shift for escalated incidents, providing timely updates to stakeholders and external teams as required.
- Generate incident reports and contribute to shift performance metrics, ensuring all relevant data is captured for post-incident analysis.
- Ensure clear communication and collaboration with other shift leads and teams to maintain consistency across SOC operations
Here at Applaudo Studios values as trust, communication, respect, excellence and team work are our keys to success. We know we are working with the best and thus treat each other with respect and admiration without asking.
Submit your application today, and don't miss this opportunity to join the Best Digital team in the Region!
We truly appreciate all the hard and outstanding work our team makes every day at Applaudo Studios, and that's why the perks that we offer, are deeply thought and designed as a way to thank them for their commitment and excellence.
Some of our perks and benefits:
- Work from home
- Flexible schedule
- Celebrations
- Special discounts
- Entertainment area
- Flexible work spaces
- Great work environment
- Private medical insurance
*Benefits may vary according to your location and/or availability. Request further information when applying.