Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Oct 3, 2024
    Deadline: Not specified
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    Our business is unique in its ability to reach globally, service locally and provide cross-jurisdictional services.
    Read more about this company

     

    L3 SOC/Security Analyst

    Summary of the position

    • Seeking a L3 SOC/Security Analyst proficient in monitoring, analyzing, and responding to security incidents within a fast-paced environment. Responsibilities include advanced threat detection, incident response, and mitigation strategies. The ideal candidate possesses expertise in SIEM platforms, network security protocols, and intrusion detection systems. Strong analytical skills, attention to detail, and the ability to collaborate effectively with cross-functional teams are essential. Candidates should demonstrate a comprehensive understanding of cyber threats, vulnerabilities, and industry best practices, along with relevant certifications such as OSCP, GCIH, or SANS GCFE or related field equivalent experience.

    Outline of main duties and responsibilities

    The SME/Expert Security Analyst L3 performs penetration tests, threat hunting, and optimising security monitoring tools. Key responsibilities include:

    • Demonstrating in-depth knowledge of network, endpoint, threat intelligence, forensics, malware reverse engineering, and the functioning of specific applications or underlying IT infrastructure.
    • Review asset discovery and vulnerability assessment data to identify and prioritize vulnerabilities that pose the most significant risk to the organisation.
    • Identifying and investigating stealthy threats within the network using the latest threat intelligence.
    • Conduct penetration tests on production systems to assess resiliency and identify areas for improvement.
    • Recommending optimization strategies for security monitoring tools based on threat-hunting findings.
    • Supporting the SOC Manager and participating in various projects requiring cybersecurity expertise.

    Skills and experience required

    The successful candidate will:

    • Bachelor’s degree in computer science, Offensive Security Certified Professional (OSCP), GIAC Certified Incident Handler (GCIH),  SANS GCFE or related field equivalent experience.
    • Minimum of 4-6 years of experience in cybersecurity operations, focusing on threat hunting, penetration testing, and security tool optimisation.
    • Expert knowledge of security monitoring tools and protocols (WSG, ESG, CASB, DLP, IDPS, SIEM correlation rules and queries, vulnerability management tools, Threat Intelligence tools, etc.)
    • Expertise in log analysis, packet analysis, and forensic tools.
    • Strong scripting and automation skills (e.g., Python, PowerShell).
    • Strong analytical and problem-solving skills.
    • Ability to thrive in a fast-paced environment and manage multiple tasks simultaneously.
    • Ability to thrive in a fast-paced environment and manage multiple tasks simultaneously.
       

    Method of Application

    Interested and qualified? Go to Apex Group on apex-careers-new.ttcportals.com to apply

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at Apex Group Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail