Posted 1mo ago

SOC Analyst L1 (m/f/d)

@ Bruker
Dubai, /, United Arab Emirates
OnsiteFull Time
Responsibilities:Monitor alerts, Investigate incidents, Prepare reports
Requirements Summary:Bachelor's in CS/IT; 2–3 years in SOC/cybersecurity; Linux admin experience; MS XDR/Sentinel; KQL; incident handling; phishing; MITRE ATT&CK; Cyber Kill Chain; Azure VMs; strong analytics and communication.
Technical Tools Mentioned:Linux/Unix, Microsoft Defender, Microsoft Sentinel, XDR, KQL, Azure Virtual Machines, MITRE ATT&CK, Cyber Kill Chain
Save
Mark Applied
Hide Job
Report & Hide
Job Description

About the Company

Bruker is a global leader in scientific instrumentation and solutions, empowering innovation across life sciences, healthcare, and advanced materials. With a commitment to excellence and cutting-edge technology, we deliver precision tools that enable breakthroughs in research and industry. Our cybersecurity team plays a critical role in safeguarding Bruker’s digital ecosystem, ensuring resilience against evolving threats and protecting the integrity of our global operations.

 

For more information, please visit www.bruker.com

 

About the Role

As a Security Operations Center (SOC) Analyst – L1, you will be the first line of defense against cyber threats. You will monitor, analyze, and respond to security incidents, ensuring the confidentiality, integrity, and availability of critical systems. This role requires strong technical expertise, analytical skills, and a proactive approach to threat detection and mitigation.

Key Responsibilities

  • Monitor and analyze security alerts from SIEM and XDR platforms. (Microsoft Defender and Microsoft Sentinel Preferred)
  • Investigate and respond to security alerts coordinate further steps with L2 for containment, eradication, and recovery.
  • Investigate phishing alerts.
  • Utilize frameworks like MITRE ATT&CK and Cyber Kill Chain for threat modeling and hunting.
  • Prepare detailed incident reports and trend analysis for stakeholders.

Required Skills & Qualifications

  • Education: Bachelor’s degree in Computer Science, Information Technology, or related field.
  • Experience: 2–3 years in SOC operations or cybersecurity roles.
  • Hands-on experience (minimum 1 year) with Linux/Unix OS administration and security.
  • Strong knowledge of Microsoft XDR and Microsoft Sentinel for threat detection and response.
  • Proficiency in KQL for log analysis and custom detection rules.
  • Solid understanding of incident handling processes (containment, eradication, recovery).
  • Familiarity with phishing investigation techniques and email security best practices.
  • Knowledge of MITRE ATT&CK framework, Cyber Kill Chain, and threat hunting methodologies.
  • Experience in managing and securing Azure Virtual Machines.
  • Strong analytical and problem-solving skills with attention to detail.
  • Excellent communication and reporting skills for cross-team collaboration.

Why Join Us?

  • Opportunity to work with cutting-edge cybersecurity technologies.
  • Collaborative and growth-oriented work environment.
  • Continuous learning and professional development programs.