On behalf of our partner, a fast-growing European cybersecurity services provider with operations in Greece, Cyprus and Central Europe, we are looking for a SOC Analyst to join their 24/7 Security Operations Center in Athens.
Our client delivers managed security services, incident response and threat monitoring solutions to clients across financial services, energy, telecom and large enterprise sectors. With a strong focus on proactive defense and operational resilience, the company supports organizations in strengthening their cybersecurity posture in line with evolving regulatory and threat landscapes.
As a SOC Analyst, you will be part of a dedicated team responsible for monitoring, detecting and responding to cybersecurity incidents across multiple client environments.
What You Will Do:
- Monitor security alerts and events through SIEM, EDR and other security monitoring platforms
- Analyze and triage security incidents according to defined SLAs and playbooks
- Investigate suspicious activity, validate true positives and escalate complex incidents to senior analysts
- Perform log analysis and correlate events across endpoints, network devices and cloud environments
- Execute initial containment and remediation actions where applicable
- Document incidents thoroughly and prepare clear technical reports for internal teams and clients
- Contribute to detection rule tuning and improvement of use cases to reduce false positives
- Participate in threat hunting activities and continuous improvement initiatives
- Support vulnerability management follow-ups and security posture reviews
- Stay up to date with emerging threats, attack techniques (MITRE ATT&CK) and security trends
- Participate in shift rotation (including nights/weekends if applicable)
Requirements:
- Bachelor's degree in Computer Science, Information Security, Engineering or related field
- 2-4 years of experience in a SOC or cybersecurity monitoring role
- Hands-on experience with SIEM platforms (e.g., Microsoft Sentinel, Splunk, QRadar or similar)
- Familiarity with EDR/XDR tools (e.g., Microsoft Defender, CrowdStrike, SentinelOne, etc.)
- Good understanding of networking fundamentals (TCP/IP, DNS, HTTP/S, VPNs, Firewalls)
- Knowledge of security concepts such as IDS/IPS, endpoint protection, malware analysis basics
- Understanding of incident response processes and escalation procedures
- Experience working with Windows and/or Linux environments
- Ability to analyze logs and identify patterns of malicious activity
- Strong analytical thinking and problem-solving skills
- Good written and verbal communication skills
- Fluency in Greek and English
- Certifications such as CompTIA Security+, CySA+, CEH or equivalent will be considered a plus
What We Offer:
- Competitive remuneration package based on experience
- Private medical and life insurance plan
- Hybrid working model
- Continuous training and certification support
- Exposure to enterprise-level infrastructures and international clients
- Clear career progression path within the SOC structure
If you are looking to grow within a structured SOC environment and gain exposure to complex security operations, we would be happy to connect and discuss this opportunity further.
