L3 SOC/Security Analyst needed at Apex Group

Save 1 day ago

Job title : L3 SOC/Security Analyst

Job Location : Western Cape, Cape Town

Deadline : November 03, 2024

Quick Recommended Links

Summary of the position

  • Seeking a L3 SOC/Security Analyst proficient in monitoring, analyzing, and responding to security incidents within a fast-paced environment. Responsibilities include advanced threat detection, incident response, and mitigation strategies. The ideal candidate possesses expertise in SIEM platforms, network security protocols, and intrusion detection systems. Strong analytical skills, attention to detail, and the ability to collaborate effectively with cross-functional teams are essential. Candidates should demonstrate a comprehensive understanding of cyber threats, vulnerabilities, and industry best practices, along with relevant certifications such as OSCP, GCIH, or SANS GCFE or related field equivalent experience.

Outline of main duties and responsibilities

The SME/Expert Security Analyst L3 performs penetration tests, threat hunting, and optimising security monitoring tools. Key responsibilities include:

  • Demonstrating in-depth knowledge of network, endpoint, threat intelligence, forensics, malware reverse engineering, and the functioning of specific applications or underlying IT infrastructure.
  • Review asset discovery and vulnerability assessment data to identify and prioritize vulnerabilities that pose the most significant risk to the organisation.
  • Identifying and investigating stealthy threats within the network using the latest threat intelligence.
  • Conduct penetration tests on production systems to assess resiliency and identify areas for improvement.
  • Recommending optimization strategies for security monitoring tools based on threat-hunting findings.
  • Supporting the SOC Manager and participating in various projects requiring cybersecurity expertise.

Skills and experience required

The successful candidate will:

  • Bachelor’s degree in computer science, Offensive Security Certified Professional (OSCP), GIAC Certified Incident Handler (GCIH),  SANS GCFE or related field equivalent experience.
  • Minimum of 4-6 years of experience in cybersecurity operations, focusing on threat hunting, penetration testing, and security tool optimisation.
  • Expert knowledge of security monitoring tools and protocols (WSG, ESG, CASB, DLP, IDPS, SIEM correlation rules and queries, vulnerability management tools, Threat Intelligence tools, etc.)
  • Expertise in log analysis, packet analysis, and forensic tools.
  • Strong scripting and automation skills (e.g., Python, PowerShell).
  • Strong analytical and problem-solving skills.
  • Ability to thrive in a fast-paced environment and manage multiple tasks simultaneously.
  • Ability to thrive in a fast-paced environment and manage multiple tasks simultaneously.
     

How to Apply for this Offer

Interested and Qualified candidates should Click here to Apply Now

  • ICT jobs

Share this job