About the job
About Protera Technologies
Join Protera Technologies, a trailblazer transforming the operations of SAP-centric organizations in the cloud since 1998. We specialize in migrating SAP and its associated applications to platforms like Microsoft Azure and AWS. Our diverse team operates globally, with headquarters in Chicago, and additional offices in Athens and Mumbai, dedicated to creating seamless, efficient, and enjoyable IT solutions for our clients.
At Protera, we prioritize a culture that balances professionalism with a friendly atmosphere. We’re passionate about delivering superior IT services while ensuring our workplace is engaging and fun. Whether we’re collaborating on cloud innovations or simply enjoying team-building activities, we value hard work alongside a vibrant company culture.
We are committed to empowering SAP organizations with cutting-edge tools and technology to facilitate growth. Our core values revolve around curiosity, authenticity, and fostering meaningful relationships. We celebrate every achievement, big or small, from successful project completions to team gatherings.
If you are eager to blend technology with a fun work environment, we invite you to explore the opportunities at Protera.
Shift Timing: Rotational (24/7)
Key Responsibilities
The SOC Analyst will play a crucial role in safeguarding our organization’s cybersecurity framework through vigilant monitoring, detection, and incident response. Utilizing advanced technologies such as Endpoint Detection and Response (EDR), Security Information and Event Management (SIEM), Network Detection and Response (NDR), File Integrity Monitoring (FIM), and Next-Gen Antivirus (NGAV), you will identify and address security threats in real time. Additionally, this position involves contributing to the creation and enhancement of automated playbooks via Security Orchestration, Automation, and Response (SOAR) platforms to optimize response processes and boost SOC efficiency. Collaboration across teams is essential to refine detection logic, improve processes, and ensure proactive defenses against emerging cyber threats.
Threat Monitoring & Detection
- Analyze security alerts from SIEM, EDR, NDR, FIM, and Antivirus tools to identify potential threats.
- Conduct correlation and pattern analysis across various data sources to detect anomalies and advanced attack behaviors.
- Continuously refine and enhance detection rules to minimize false positives and enhance accuracy.
Incident Response & Management
- Implement incident response lifecycle activities, including triage, containment, eradication, and recovery in accordance with NIST standards.
- Thoroughly document incidents, providing root cause analysis, attack vectors, and corrective measures.
- Assist in post-incident reviews to identify security gaps and suggest improvements.
Playbook Development & Enhancements
- Collaborate with team members to design and optimize automated playbooks for improved incident response.

