FIND INTERNSHIPS

Soc Analyst

Posted on Feb. 10, 2026 by AmagisTech Ltd

  • Full Time

Soc Analyst

Who we are

AmagisTech was founded to bring the best cybersecurity solutions, previously the domain of Big Tech, and make them accessible to SMEs.

Our mission: democratize digital security and make Italian companies resilient to threats, freeing them from the burden of obsolete and insecure IT.

AmagisTech is the platform that anticipates the future. If we succeed, we will become the default solution for securing business in Italy. This is a game-changing goal.

We are looking for people who want more than just a job: they want to build an exponential career. We are a strong team, and you will be on the front line. We are at the stage where a great idea becomes a global powerhouse.

Who We Are Looking For

We don't care who you have been, only who you want to become. We are not looking for passive operators who stare at monitors; we are looking for Threat Hunters with the hunger to learn and the drive to conquer complexity.

You Are Our First Line of Defense: You will be the vigilant eye protecting our clients while they sleep. You are the one who spots the anomaly before it becomes a disaster. Modern Stack Obsessed: Forget legacy tools. Here you will work with the most advanced SIEM, SOAR, and EDR technologies on the market (e.g., Microsoft Sentinel, CrowdStrike, Splunk). You will access exclusive resources to master the art of Threat Detection.

Your Mission

You will be the architect of our clients' resilience. Your reaction speed determines the difference between a secure business and a critical incident.

  • Detection & Triage: Constantly monitor security alerts, distinguishing false positives from real threats with surgical precision.

  • Incident Response: You don't just watch. When the alarm rings, you activate playbooks, isolate the threat, and lead containment and eradication actions.

  • Threat Hunting: You don't wait for the alert. You proactively analyze data searching for IoCs (Indicators of Compromise) and hidden adversary tactics.

  • Engineering & Automation: If a task is repetitive, you automate it. You will contribute to creating smarter detection rules and SOAR playbooks to reduce "noise" and focus on what matters.

Who You Are

You have the ambition and the mindset to reject the status quo of passive defense.

  • Hunger: You have 1–3 years of experience in SOC, Blue Team, Network Security, or SysAdmin roles with a strong security focus. If you know the MITRE ATT&CK framework and can read a log like an open book, you are the right person.

  • Want to Make History: We are in a phase of building and conquering. This is not a quiet "ticket factory" job. It is a constant battle against real adversaries.

  • Impact-Oriented: You don't just forward a ticket. You investigate, understand the root cause, and propose the solution to block the attacker. Your success is measured by minimizing Mean Time to Respond (MTTR).

  • Problem Solver, Not Reporter: You don't just say "there is a virus." You analyze the attack chain and help harden the perimeter so it doesn't happen again.

What We Offer

More than just compensation—a ticket to specialized professional growth.

  • Compensation: 25K-30K with bonuses tied to detection and response goals.

  • Hybrid Model: Office in Milan / Malta (4 days) for intense collaboration with SOC leadership. Flexibility is balanced by customer needs.

  • Accelerated Vertical Growth: You will witness a Tech Scale-up become an industry leader. You will have access to high-level training and certifications. Here, the learning curve is a straight line upwards.

  • Explosive Environment: We work with extreme rigor, but we celebrate humility and team spirit. We hustle during an incident, we laugh about it after the post-mortem, and we secure the future together.

Selection Process: Technical Meritocracy

You must stand out. Technical potential and the drive to deliver are our currency.

  • Phase 1: Screening Call (30 minutes).

  • Phase 2: Written Technical Test (1 hour, asynchronous) – Focused on Log Analysis, Network Traffic & Incident Triage.

  • Phase 3: Technical Interview with the SOC Lead (45 minutes) – Real incident simulation. Show us how you think under pressure.

  • Phase 4: Cultural & Strategic Fit Interview (30 minutes).

Compensation Range: €25K - €30K


Advertised until:
March 12, 2026


Are you Qualified for this Role?


Click Here to Tailor Your Resume to Match this Job


Share with Friends!

Similar Internships


SOC Analyst

1 Opening Singapore Role description Job Summary We are seeking a detail-oriented and proactive …

SOC Analyst

Description SOC Analysts are responsible for managing and resolving security incidents that are esc…

SOC Analyst - Remote

Work Mode: Remote Engagement Type: Independent Contractor Schedule: Full-Time or Part-Time Contract…

Alternance - SOC Analyst (M/F/X)

Alternance - SOC Analyst (M/F/X) Offer ID: 82796 Job: Digital and IT / Cybersecurity Contract type:…

L1 - SOC Analyst - Onsite, Scottsdale

ABOUT THE ROLE Title: SOC Analyst L1 Department: Managed SOC Classification: Full-time, Exempt Repo…

Loan Documentation and Processing Intermediate Assoc Analyst

The Loan Doc & Proc Intmd Assoc Analyst is a developing professional role which integrates in-d…