Quick Summary
Overview
The CyberSOC Analyst is responsible to identify, analyze, communicate, defend, and contain information security incidents. * Conducts network monitoring and intrusion detection analysis using various computer network defense tools, such as intrusion detection/prevention systems (IDS/IPS),…
Technical Tools
awsazuregcppower-bipythonreactsplunkcybersecuritylinuxnetworkingproject-management
The CyberSOC Analyst is responsible to identify, analyze, communicate, defend, and contain information security incidents.
* Conducts network monitoring and intrusion detection analysis using various computer network defense tools, such as intrusion detection/prevention systems (IDS/IPS), firewalls, host-based security systems (HBSS), etc
* Correlates network activity across networks to identify trends of unauthorized use• Research emerging threats and vulnerabilities to aid in the identification of incidents
* Analyze the results of the monitoring solutions, assess, and correlate the output using automated systems. Conduct triage, event correlation, classification, and analysis of these events such that incidents are investigated and logged or followed up using the existing information risk incident management processes
* Provide pro-active feedback which will enable improvement of the current monitoring rules, based on information and knowledge/experience from Schlumberger and Industry best practices.
* Capable of working unsupervised, but able to interact and give direction to business and IT (Information Technology) teams in line within established corporate security policies and processes.
* Develops and maintains constructive and cooperative working relationships with team members• Demonstrates the ability to drive creative, innovative ways to solve problems or minimize risk
* Consultative skills and ability to work cross-functionally
* Focused and results oriented• Ability to react quickly, decisively, and deliberately in high-stress, high-impact situations
* Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
Certifications (1 or more of the following) **
Current (not future/or planned) Certification are preferable
* SANS (SysAdmin, Audit, Network, and Security) GIAC (Global Information Assurance Certification) certification in Cyber Defense, Penetration Testing, Incident Response or Forensics
* Certified Information Systems Security Professional (CISSP)
* Certified Information Security Manager (CISM)
* EC-Council certification: CEH (Certified Ethical Hacker), ECSA (Certified Security Analyst), CHFI (Computer Hacking Forensic Investigator), CND (Certified Network Defender)
* Cisco Certified Network Associate (CCNA)
Technical Skills
* Data Security
* Data Loss Prevention tools, (e.g., AIP (Azure Information Protection), IRM (Information Rights management))
* Endpoint
* Antivirus solutions (e.g., Microsoft Defender)
* Strong Windows and Linux administration experience
* Information Security tools & packet analyses tools (e.g., Cb, Wireshark)
* OT/IIoT Security
* * Awareness of SCADA (Supervisory Control and Data Acquisition) / IIoT (Industrial Internet of Things) technologies
* Network Security
* Firewall (e.g., Pato Alto Networks)
* Internet Protocols and Services (e.g., TCP/IP, FTP (File Transfer Protocol), HTTPS, SSH (Secure Shell))
* Intrusion Detection (e.g., IDS/IPS tools)
* Network scanning tools (e.g., NMAP)o Networking infrastructure (Cisco is preferred)
* Information Security tools & packet analyses tools (e.g., Cb, Wireshark)
* Security Event Monitoring and Analysis
* * Log analysis/ Windows event analysis
* Security Information and Event Management (SIEM) – Chronicle and Splunk are preferred
* Compliance and Audit
* Fair understanding of the NIST (National Institute of Standards and Technology) CS (Cyber Security) Framework
* Vulnerability Management
* Vulnerability Testing tools (e.g., Qualys, Kali)
* Scripting/Automation
* Programming/Scripting tools (e.g., Python, Bash, PowerShell, YARA-L)
* Incident Response - Security Risk
* Strong troubleshooting and root cause analysis skills
* Cyber outbreak management and the ability to differentiate malicious activity from directed attack patterns
* Application Security
* Fair understanding of the threat modeling
* Could Security
* Cloud experience (e.g., Azure, GCP (Google Cloud Platform), AWS (Amazon Web Services), Yandex, G42)
* Forensics
* Malware analysis and memory analysiso Network and Host forensics
* Threat Intel
* Experience in analyzing threat intel feeds.
* Email security
* Phishing detection tools (e.g., Proofpoint TRAP, CLEAR)
* Identity & Access Management
* Azure Active Directory
* Cloud Access Security Broker (CASB)
* Federation
* Conditional Access
* Zero Trust
* Project Management
* Basic project management experience
* Common Technical Skills
* SharePoint and PowerBI experience are an advantage
* YARA-L, PowerShell or Python coding experience is an advantage
Location & Eligibility
Where is the job
—
Location terms not specified
Listing Details
- Posted
- May 14, 2026
- First seen
- May 14, 2026
- Last seen
- May 14, 2026
Posting Health
- Days active
- 0
- Repost count
- 0
- Trust Level
- 51%
- Scored at
- May 14, 2026
Signal breakdown
freshnesssource trustcontent trustemployer trust
External application · ~5 min on slb's site
Please let slb know you found this job on Jobera.
3 other jobs at slb
View all →Explore open roles at slb.
Browse Similar Jobs
Manager5.6kAssistant Manager5.5kTeam Member5.1kEngineer3.4kDirector2.7kAssistant2.5kConsultant2.4kAssociate2.2kData Collector2.2kFitness & Wellness2.1kTechnician1.9kRestaurant General Manager1.8kSupervisor1.8kCoordinator1.7kTeam Leader1.6kCrew Member1.2kBehavioral Health1.2kSocial Worker1.1kAssistant General Manager1.1kPart Time1.1k
Newsletter
Stay ahead of the market
Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.
A
B
C
D
No spam. Unsubscribe at any time.