Extensive experience reviewing and analysing log data Proficient with well-known information security tools Strong familiarity with Windows and Linux operating systems Solid foundation in networking fundamentals, including TCP/IP Knowledge of common network-based services and client/server applications Excellent verbal and written communication, interpersonal, and organizational skills Proven ability to interact with clients professionally during high-pressure situations Strong problem-solving skills for diagnosing technical issues Ability to manage customer interactions professionally Capacity to learn new technologies and concepts quickly Willingness to work in shift rotations or on-call schedules Experience in mission-critical SOC or operations teams In-depth understanding of exploits, vulnerabilities, and adversary tactics Hands-on experience with Malware Analysis, Phishing Email Analysis, Log Analysis, and Digital Forensics Experience with FTK, Redline, EDR tools, and enterprise SIEM platforms Familiarity with ITSM, IT GRC, and Cyber Case Management tools Scripting knowledge (Python, Perl, Bash, PowerShell) Previous experience mentoring junior analysts or leading SOC initiatives Strong client-facing skills and ability to lead incident calls