SOC Analyst (Maternity Cover)

Corporate IT Dublin, Ireland


Description

About Us:  

At Sitecore, our mission is to simplify how brands reach, engage, and serve people by delivering intelligent, personalized digital experiences that connect the world. We empower the world’s most iconic brands to build lifelong relationships with their customers—seamlessly, smartly, and at scale.
 

As the leading provider of agentic digital experience software, Sitecore brings together content, commerce, and data into one composable platform that enables brands to deliver millions of meaningful, adaptive experiences every day. Trusted by global leaders such as American Express, Porsche, Starbucks, and L’Oréal, Sitecore helps brands transform engagement through experiences that are not only personalised but predictive and dynamic.
 

Our foundation is our people—a diverse, passionate, and collaborative global team spanning over 25 countries. We believe that every experience matters, and that belief starts with how we work together. Our values guide how we lead, innovate, and connect. They are the behaviors that bring our mission and vision to life, every day, in every interaction.
 

As we continue to evolve, we are actively cultivating AI skills across our teams to unlock new levels of creativity, efficiency, and insight. From engineering to customer experience, AI capabilities are becoming integral to how we design, build, and deliver the next generation of digital experiences.
 

Learn more at Sitecore.com.
About The Role:
Sitecore is looking for a dedicated and detail-oriented Security Engineer with a strong focus on Security Operations Center (SOC) functions to support our global cybersecurity operations. Based in Dublin, Ireland, the Security Engineer will play a critical role in daily SOC activities, including incident triage, investigation, escalation, and reporting.
This position will support our 24x7 SOC operations and will involve rotational weekend coverage. The ideal candidate has experience working with SIEM platforms like Microsoft Sentinel, collaborating with Managed Security Service Providers (MSSPs), and has a strong understanding of threat detection and incident response processes.
What You'll Do: 
SOC Operations & Incident Management 
  • Monitor and respond to alerts generated by SIEM and other security platforms in real-time. 
  • Triage and investigate potential security incidents, escalating as needed per incident response procedures. 
  • Collaborate with the MSSP to ensure timely and accurate incident detection, analysis, and response. 
  • Document and track incidents from detection through resolution, including post-incident analysis and reporting. 
  • Develop and deploy automated security playbooks to improve incident response efficiency. 
Threat Detection & Reporting 
  • Analyze log data and threat intelligence to identify patterns and potential indicators of compromise (IOCs). 
  • Produce clear, concise, and timely reports on incidents, trends, and operational metrics. 
  • Participate in daily SOC operations meetings and provide updates on ongoing investigations. 
  • Develop and implement security detection rules and correlation use cases to enhance threat visibility. 
  • Conduct proactive threat hunting using SIEM and EDR tools to identify potential security incidents. 
Collaboration & Escalation
  • Work closely with internal teams (IT, Product, R&D, GRC) to escalate and resolve security issues.
  • Ensure all incidents are properly documented and communicated to stakeholders based on severity.
  • Provide input to enhance detection rules, use cases, and playbooks for better coverage.
Tool Management & MSSP Coordination
  • Utilize and support SIEM tools like Microsoft Sentinel for detection, correlation, and analysis.
  • Work directly with MSSPs to monitor service levels, investigate escalated events, and continuously improve operations.
  • Provide feedback and work with the Security Manager to refine SOC processes and improve incident response maturity.
Shift & Weekend Coverage
  • Participate in a rotational weekend schedule to support 24x7 SOC coverage.
  • Be available for urgent escalations and high-priority incidents during assigned shifts.
 What You Need to Succeed:   
  • At least 3 years of experience in a SOC, incident response, or cybersecurity operations role. 
  • Hands-on experience with SIEM tools, preferably Microsoft Sentinel. 
  • Familiarity with working alongside MSSPs in a 24x7 monitoring model. Strong understanding of incident response lifecycle, threat hunting, and alert triage. 
  • Hands-on experience in developing and deploying automated security response playbooks. 
  • Hands-on experience in cloud environments Azure and AWS. 
  • Good knowledge of network security, log analysis, and common attack techniques. 
  • Security certifications such as CySA+, CEH, GCIH, CISSP or similar are a plus. 
Work Conditions
  • Rotational weekend support is required as part of 24x7 SOC operations.
  • May involve occasional after-hours support for critical security incidents.
How we hire  
At Sitecore, we put a lot of care and time into who we hire. We believe that in order to build the best products, we need to build high-impact teams. Our recruitment process centers around what we call the Life Story interview, a conversational-style interview where we get to learn more about you. 

Share this job