SOC Analyst
Bytamic Solutions
⚲ Warszawa, Kraków, Poznań
80 - 110 PLN/h netto (B2B)
Wymagania
- Kibana
- MDR platforms
- SoC
- SIEM
- Elasticsearch
Opis stanowiska
Bytamic is an international IT services and Consulting company with its headquarters in Vienna, Austria and subsidiary companies in Warsaw and Poznan. We work with multinational companies and we drive digital transformation for our clients. We are truly agile, work with the latest technologies and our engineers and scrum-teams deliver state-of-the-art product development services for our clients. Delivering with highest quality standards is key to us – therefore we focus on continuous training & education of our engineers. About the Client CREALOGIX is a leading global provider of FinTech software solutions, working with some of the world's most innovative financial brands. We are dynamic and growing with over 380 employees in Switzerland, Germany, Spain, the UK, the Middle East and Singapore. Some of the world's largest banks, as well as wealth managers, have chosen our modern SaaS and cloud-based technology to meet the needs of their clients. And it's our people who make the difference. About the role For our Client we are looking for a qualified SOC Analyst to join our Security Operations Center team.The role is suitable for an experienced SOC analyst with strong communication skills, a proactive attitude, and a willingness to continuously develop security expertise. The analyst will work as part of the core SOC team, contributing to detection, incident response, and threat hunting activities, using modern SIEM, MDR, and automation-driven security platforms. Responsibilities • Security monitoring, detection, and incident response (IR), Threat hunting and advanced security analysis • Operate and continuously improve SIEM use cases, including:• Log collection, correlation, and analysis • Tuning and optimization of alerts and detection logic • Perform incident and risk analysis, providing clear and actionable recommendations • Support daily SIEM operations and ensure compliant log storage • Contribute to security automation initiatives aimed at reducing alert fatigue and improving response times • Support vulnerability management activities in cooperation with MDR services • Collaborate with internal stakeholders during onboarding, knowledge transfer, and daily operations What you need: • Experience working in a SOC or security operations environment • Solid understanding of: • Security monitoring and alert handling • Incident response processes • Threat detection and analysis • Hands-on experience or strong practical knowledge of SIEM solutions, including log collection, correlation, and analysis(experience with Elasticsearch and Kibana is highly desirable) • Experience working with Managed Detection and Response (MDR) platforms and vulnerability management processes(Rapid7 experience is an advantage) • Familiarity with modern endpoint protection and detection platforms and interest in automation-driven, agent-based security architectures(experience with or readiness to work with CrowdStrike or similar solutions is a strong plus) • Understanding of security automation concepts to improve detection, investigation, and response efficiency • Good communication skills and ability to work effectively in a team • Proactive mindset, analytical thinking, and willingness to learn • Professional working proficiency in English What you can expect from us: • Working with latest technologies • Lots of career development potentials (career-planning) • Challenging projects (mostly product/feature development) • International software development teams with distributed delivery groups • Private healthcare and Multisport card at employment of contract or reimbursement for it at B2B contract • Attractive remuneration • Language classes (usually business English; but not limited to) • Modern computer equipment • Employee referral programme • Integrational meetings & events If you think that this job offer can be for you, we would like to hear from you:) #soc #itjobs