Security Analyst (SOC Tier 1)
Strength. Care. Growth.
A1 Competence Delivery Center is a vital component of A1's
telecommunications business. Acting as an expertise hub, CDC is
dedicated in delivering full range of high-quality IT, network,
financial and HR to support A1's operations across all OpCos,
independent of location.
Using the power of A1 Group and leveraging bynergies, CDC enables
transparency of resources, key skills and knowledge expansion and
personal career growth opportunities’, paired with job stability.
will
You will know we are the right place for you, if you are driven
by:
Opportunities to learn and build your career;
Meaningful work in a stable and fast-paced company;
Diversity of people, projects, and platforms;
A supportive, fun, and inspiring place to work.
Would you like to join us?
Aleksandra Georgieva is looking for a new team member.
We are expanding the A1 Group SOC team within Security Department
of the A1 Competence Delivery Center. Be a part of this exciting
journey!
You will be responsible for continuously monitoring and analyzing
the organization’s security posture. The role focuses on
identifying, investigating, and helping to mitigate risks and
vulnerabilities to ensure the protection of data, infrastructure,
and systems.
Your daily routine would include:
Monitoring security events and alerts in real time to identify
malicious activity and anomalies.
Conducting initial investigation and analysis of detected security
incidents by following documented procedures and playbooks.
Classify and prioritize security alarms based on severity and
context.
Document investigation actions, findings, and decisions in the case
management system.
Escalate security incidents to Tier 2 analysts for deeper
investigation and response where required.
Supporting Tier 2 analysts during in-depth investigations by
collecting relevant logs, documenting early observations, and
escalating contextual details.
Assist with daily operational tasks, including basic forensic
triage and threat intelligence reviews, under supervision.
Identify and propose improvements to SOC workflows and processes to
enhance operational effectiveness.
Operate within a 24/7 shift model, working 12-hour shifts (day and
night rotations).
We’ll know you can make it if you have:
Bachelor’s degree in Computer Science, Information Technology,
Cybersecurity, or equivalent relevant experience.
Experience working with SIEM platforms such as Splunk and Microsoft
Sentinel, and Microsoft Defender for Endpoint.
Basic understanding of incident response, threat detection, and
alert lifecycle management.
Familiarity with security concepts such as IDS/IPS, endpoint
protection, and MITRE ATT&CK.
Certifications such as CompTIA Security+, SC-200, SC-900, Splunk
Core Certified User, or similar are a strong advantage.
Strong analytical mindset, attention to detail, and a willingness
to learn and grow within the SOC environment.
Effective written and verbal communication skills.
Our gratitude for the job done will be eternal, but we’ll also
offer you:
Innovative technologies and platforms to “play” with;
Modern working environment for your comfort;
Friendly, ambitious, and motivated teammates to support each
other;
Thousands of online and in-person learning opportunities to
grow;
Challenging assignments and career development opportunities in
multinational environment;
Attractive remuneration package;
Flexible working schedule and opportunity for home office;
Numerous additional goodies, including, but not limited to free A1
services, discounts, health insurance and services, sports center,
childcare, team and family events, etc.