Job Description
Please find the Job Description below for your reference.
About us
HR Path Company is the Human Resource Solutions Specialist. As a partner of the leading vendors of the market, it carries out HRIS implementation projects and payroll outsourcing for large accounts as well as for SMEs. HR Path supports you in all your HR strategies, in France and internationally.
The group, established in 2001, has over 2500 employees, supports more than 1,500 clients and generates Headquartered in Paris, HR Path also has international subsidiaries in 18 different countries.
We are the most experienced Workday and Success Factors partner in APAC
For more information, visit Overview
We are looking for an Assistant Security Analyst to join our Security Operations Center (SOC). The candidate will be responsible for basic SIEM monitoring, initial alert validation, log review, and ticketing support. This role is ideal for fresh graduates or early-career professionals who want to start their journey in cybersecurity and grow into L1/L2 analyst roles.
Key Roles & Responsibilities
SIEM Monitoring & Alert Management
- Continuously monitor SIEM dashboards for security alerts, anomalies, and suspicious activities across the enterprise environment.
- Perform initial triage of alerts by validating severity, reviewing associated logs, and determining the potential impact and urgency.
- Identify false positives versus genuine security events using predefined criteria and escalation guidelines.
- Assign validated incidents to L1 Security Analysts for detailed investigation, ensuring complete context and supporting evidence are included.
Firewall, Proxy & Email Security Log Analysis
- Collect, review, and correlate firewall, proxy, and email security logs to identify policy violations, suspicious traffic patterns, or malicious activity.
- Detect and report abnormal behaviors such as repeated connection attempts, access to malicious domains, or suspicious email activity.
- Assist senior analysts in updating and maintaining blocklists, whitelists, and security policies as per approved procedures.
- Support ongoing monitoring efforts to improve visibility across network and email security controls.
Incident Response Support
- Follow predefined incident response playbooks and runbooks for common security scenarios such as phishing attacks, malware detections, brute-force attempts, and policy violations.
- Create, update, and maintain incident tickets with accurate technical details, timelines, screenshots, and initial findings.
- Support L1 and L2 analysts during investigations by assisting with evidence collection, log gathering, and documentation.
- Ensure incidents are properly tracked through their lifecycle until closure or escalation.
SLA Management & Documentation
- Ensure all security alerts and incidents are acknowledged, logged, and updated within defined SLA timelines.
- Maintain accurate incident logs, shift handover notes, and daily operational reports for SOC visibility.
- Proactively escalate incidents when SLA thresholds are at risk or when additional expertise is required.
- Ensure documentation meets SOC quality, audit, and compliance standards.
Communication, Collaboration & Learning
- Communicate clearly and professionally with SOC team members regarding alerts, findings, and escalation status.
- Share daily updates during shift handovers and team meetings to ensure continuity of operations.
- Collaborate with peers to resolve issues efficiently and support continuous improvement initiatives.
- Actively participate in security awareness programs, training sessions, and skill development activities to stay current with evolving threats.
Required Skills & Competencies
- Basic understanding of networking fundamentals, including IP addressing, ports, firewalls, DNS, and HTTP/HTTPS.
- Awareness of core cybersecurity concepts such as phishing, brute-force attacks, malware, insider threats, and common attack vectors.
- Familiarity with SIEM tools such as Splunk, QRadar, Microsoft Sentinel, Arc Sight, or similar platforms (formal training will be provided).
- Strong analytical and problem-solving skills with a keen attention to detail.
- Good verbal and written communication skills for effective documentation and collaboration.
- Ability and willingness to work in rotational shift environments.
Preferred Certifications
(Highly beneficial for entry-level candidates)
- Comp TIA Security+ (strongly recommended)
- ISC² CC (Certified in Cybersecurity)
- EC-Council C|SCU (Cyber Security User) or CEH (for long-term career growth)
- Splunk Core Certified User or Microsoft SC-900 (Security, Compliance & Identity Fundamentals)
- Fortinet NSE 1–2 or Palo Alto PCCET
Education & Experience
- Bachelor’s degree in computer science, Information Technology, Cybersecurity, or an equivalent discipline.
- 0–1 year of experience in IT, networking, or security operations (including internships or academic projects).
- Fresh graduates with relevant certifications, hands-on labs, or strong foundational knowledge are encouraged to apply.
About us
HR Path Company is the Human Resource Solutions Specialist. As a partner of the leading vendors of the market, it carries out HRIS implementation projects and payroll outsourcing for large accounts as well as for SMEs. HR Path supports you in all your HR strategies, in France and internationally.
The group, established in 2001, has over 2500 employees, supports more than 1,500 clients and generates Headquartered in Paris, HR Path also has international subsidiaries in 18 different countries.
We are the most experienced Workday and Success Factors partner in APAC
For more information, visit Overview
We are looking for an Assistant Security Analyst to join our Security Operations Center (SOC). The candidate will be responsible for basic SIEM monitoring, initial alert validation, log review, and ticketing support. This role is ideal for fresh graduates or early-career professionals who want to start their journey in cybersecurity and grow into L1/L2 analyst roles.
Key Roles & Responsibilities
SIEM Monitoring & Alert Management
- Continuously monitor SIEM dashboards for security alerts, anomalies, and suspicious activities across the enterprise environment.
- Perform initial triage of alerts by validating severity, reviewing associated logs, and determining the potential impact and urgency.
- Identify false positives versus genuine security events using predefined criteria and escalation guidelines.
- Assign validated incidents to L1 Security Analysts for detailed investigation, ensuring complete context and supporting evidence are included.
Firewall, Proxy & Email Security Log Analysis
- Collect, review, and correlate firewall, proxy, and email security logs to identify policy violations, suspicious traffic patterns, or malicious activity.
- Detect and report abnormal behaviors such as repeated connection attempts, access to malicious domains, or suspicious email activity.
- Assist senior analysts in updating and maintaining blocklists, whitelists, and security policies as per approved procedures.
- Support ongoing monitoring efforts to improve visibility across network and email security controls.
Incident Response Support
- Follow predefined incident response playbooks and runbooks for common security scenarios such as phishing attacks, malware detections, brute-force attempts, and policy violations.
- Create, update, and maintain incident tickets with accurate technical details, timelines, screenshots, and initial findings.
- Support L1 and L2 analysts during investigations by assisting with evidence collection, log gathering, and documentation.
- Ensure incidents are properly tracked through their lifecycle until closure or escalation.
SLA Management & Documentation
- Ensure all security alerts and incidents are acknowledged, logged, and updated within defined SLA timelines.
- Maintain accurate incident logs, shift handover notes, and daily operational reports for SOC visibility.
- Proactively escalate incidents when SLA thresholds are at risk or when additional expertise is required.
- Ensure documentation meets SOC quality, audit, and compliance standards.
Communication, Collaboration & Learning
- Communicate clearly and professionally with SOC team members regarding alerts, findings, and escalation status.
- Share daily updates during shift handovers and team meetings to ensure continuity of operations.
- Collaborate with peers to resolve issues efficiently and support continuous improvement initiatives.
- Actively participate in security awareness programs, training sessions, and skill development activities to stay current with evolving threats.
Required Skills & Competencies
- Basic understanding of networking fundamentals, including IP addressing, ports, firewalls, DNS, and HTTP/HTTPS.
- Awareness of core cybersecurity concepts such as phishing, brute-force attacks, malware, insider threats, and common attack vectors.
- Familiarity with SIEM tools such as Splunk, QRadar, Microsoft Sentinel, Arc Sight, or similar platforms (formal training will be provided).
- Strong analytical and problem-solving skills with a keen attention to detail.
- Good verbal and written communication skills for effective documentation and collaboration.
- Ability and willingness to work in rotational shift environments.
Preferred Certifications
(Highly beneficial for entry-level candidates)
- Comp TIA Security+ (strongly recommended)
- ISC² CC (Certified in Cybersecurity)
- EC-Council C|SCU (Cyber Security User) or CEH (for long-term career growth)
- Splunk Core Certified User or Microsoft SC-900 (Security, Compliance & Identity Fundamentals)
- Fortinet NSE 1–2 or Palo Alto PCCET
Education & Experience
- Bachelor’s degree in computer science, Information Technology, Cybersecurity, or an equivalent discipline.
- 0–1 year of experience in IT, networking, or security operations (including internships or academic projects).
- Fresh graduates with relevant certifications, hands-on labs, or strong foundational knowledge are encouraged to apply.
Apply for this Position
Ready to join ? Click the button below to submit your application.
Submit Application