SOC Specialist

cyberproai • Israel
Relocation
Apply
AI Summary

Cyberproai is seeking a SOC Specialist to support and elevate the effectiveness and maturity of our Security Operations Center (SOC). This hands-on, operational role focuses on improving daily SOC performance through on-the-job training, refinement of detection logic, and optimization of security tooling.

Key Highlights
Improve daily SOC performance
Refine detection logic
Optimize security tooling
Technical Skills Required
SIEM QRadar Python PowerShell Bash MITRE ATT&CK NIST CIS
Benefits & Perks
Relocation package
International relocation
Full-time employment

Job Description


We are seeking a SOC Specialist to support and elevate the effectiveness and maturity of our Security Operations Center (SOC). This is a hands-on, operational role focused on improving daily SOC performance through on-the-job training (OJT), refinement of detection logic, development of clear operational procedures, and optimization of security tooling.


The SOC Specialist plays a critical role in transforming real-world operational experience into repeatable, scalable SOC practices. Working closely with SOC leadership and analysts, this position focuses on strengthening alert quality, standardizing response workflows, and improving analyst capabilities through practical guidance and continuous operational improvement.


This is a full relocation position!


WHAT YOU’LL DO

Key Responsibilities

  • Strengthen day-to-day SOC operations by improving alert quality, response workflows, and escalation processes.
  • Develop, document, and refine SOC policies, procedures, playbooks, and standard operating procedures.
  • Deliver hands-on on-the-job training (OJT) to SOC analysts.
  • Continuously evaluate and improve SIEM rules, detection logic, and alert workflows.
  • Work closely with SOC leadership to identify operational gaps and recommend improvements.
  • Provide technical guidance, mentoring, and knowledge sharing.
  • Maintain clear documentation to ensure consistency and scalability.
  • Align SOC processes with industry frameworks such as MITRE ATT&CK and NIST.
  • Optimize SIEM to improve detection and response capabilities.
  • Support SOC maturity and optimization initiatives.
  • Stay updated on emerging threats and detection trends.


THE ESSENTIALS

  • 5+ years of hands-on experience in SOC operations, cybersecurity operations, or incident response
  • Strong operational understanding of SOC workflows, alert triage, and analyst processes
  • Professional fluency in English (spoken and written)
  • Mobility: Valid foreign passport and readiness for international relocation


WHAT YOU BRING

  • Strong hands-on SIEM experience (QRadar preferred).
  • Experience improving detection logic and SOC workflows.
  • Experience developing SOC documentation and playbooks.
  • Scripting skills (Python, PowerShell, or Bash).
  • Familiarity with MITRE ATT&CK, NIST, CIS frameworks.


WHAT MAKES YOU A GREAT FIT

  • Strong communication skills.
  • Hands-on, detail-oriented mindset.
  • Ability to mentor analysts.
  • Collaborative team player.


NICE TO HAVES

  • SOC optimization or maturity projects.
  • SOAR exposure.
  • Blue Team or Purple Team background.


Subscribe our newsletter

New Things Will Always Update Regularly