Junior SOC Analyst

Short company description

BIT SENTINEL is one of the largest cybersecurity providers in Central and Eastern Europe, trusted by organizations across all major industries. Our Security Operations Center (BSS-CERT) delivers comprehensive Managed Security Services, from advanced threat detection and response to robust compliance solutions.

Our strength is forged in offense. Founded by elite ethical hackers, BIT SENTINEL’s DNA is rooted in deep expertise in penetration testing, application code review, and incident response. We think like attackers to build a stronger defense.

This offensive mindset powers our BSS-CERT, where our team of certified specialists leverages their expertise to provide proactive, intelligent security. We operate from our Bucharest headquarters with a flexible service model tailored to client needs, including 24/7 monitoring capabilities and on-call SLA-backed support to ensure our clients are protected around the clock.

The role

You will monitor SOC alerts, investigate them, and discover security incidents inside our client’s infrastructure (and our own as well). However, this won’t be a boring role where you grind alerts all day long. You will discover our detection rules, understand them, and propose new rules, and you will get to hunt for lurking threats inside the infrastructure. If something feels boring, you get to automate it, and leverage AI. And when a real incident is uncovered, you’ll be on it, helping the team understand its real breadth, and respond to it in a timely manner.

What you will do

  • Investigate & Respond: Go way past simple alert triage. You will drill down into logs, network traffic, and endpoint data to fully understand the scope of an alert and assist in full-scale incident response.
  • Solve Client Problems: Work directly on client security issues, adapting on the fly to whatever specific EDR, firewall, or logging tools that particular client happens to use.
  • Hunt for Threats: Don’t wait for the SIEM to beep. You will actively search through client environments to find hidden threats, persistent access, and anomalies that automated rules missed.
  • Automate the Boring Stuff: Build scripts and workflows to automate repetitive triage steps, alert enrichment, and basic response actions.
  • Leverage AI: Use Large Language Models (LLMs) and AI tools to accelerate your log parsing, write custom detection rules, and speed up your research.

What we are looking for

  • The CTF & Cyber Range Veteran: You spend your free time on platforms like TryHackMe, HackTheBox, CyberEDU or competing in Capture The Flag (CTF) events. You understand how attacks actually work, not just what they look like in a textbook.
  • Deep Investigative Mindset: You are naturally curious. When you see an alert, you don’t just ask “is this bad?” You ask “how did it get here, what executed it, and what did it communicate with?”
  • Tool Agnostic Adaptability: You aren’t paralyzed if a client uses a tool you’ve never seen before. You can quickly read documentation, figure out the UI, and start pulling the data you need.
  • Scripting Skills: You know enough Python, Bash, or PowerShell to interact with APIs, parse JSON logs, and automate simple tasks.
  • AI Fluency: You know how to effectively (and securely) prompt AI to help you write scripts, decode obfuscated commands, or understand unfamiliar log formats.

Bonus points

  • Relevant certifications: like CompTIA Security+ or CySA+, CCDL1, BTL1, etc.
  • Malware Analysis & Reverse Engineering: You can go beyond looking at logs and actually pull apart a suspicious binary or document in a sandbox to understand its behavior and extract IOCs.
  • Knowledge of Penetration Testing and the techniques involved

What you will learn to do during the first 3 months

  • Investigate an alert, and make a decision regarding next steps
  • Perform a threat hunt in our clients’ infrastructure
  • Create an allowlist request for a detection rule
  • Create a detection rule
  • Solve forensics and incident response CTF challenges
  • Contribute to the investigation and response of a live incident

Benefits package

  • Flexible Hybrid Work: Balance your professional and personal life with a flexible schedule that combines the best of remote work and in-office collaboration.
  • Comprehensive Health & Wellness: Your well-being is our priority. We provide private medical insurance for you and a family member, supplemented with daily meal tickets.
  • Dedicated Growth Budget: We invest in your expertise. You’ll receive a generous annual budget for professional development, including industry-leading certifications and specialized training tailored to your career goals.
  • Impactful Career Trajectory: This isn’t just a job; it’s a career path. As a key member of a growing, dynamic organization, you’ll work on a diverse portfolio of clients and have a clear runway for future advancement.
  • Competitive Compensation & Rewards: We believe in recognizing great work. You’ll receive an attractive salary, a transparent performance-based bonus scheme, and regular incentives like gift vouchers.
  • A Supportive & Collaborative Culture: Join a close-knit team of professionals in a friendly environment where your voice is heard. We build our community through fun, seasonal team-building activities that foster strong working relationships.

Other projects that we are proud of

How to contact us

We are really excited that you consider applying for your future career in cybersecurity at Bit Sentinel. Please fill out the form and we will get back to you asap. 🙂

    Upload your CV (PDF):

    I allow Bit Sentinel to process my personal data for this role and I understand I can withdraw at any point.


    [email protected]

    get in touch