SOC Analyst Level 3 job at Silensec
Website :
5 Days Ago
Linkedid Twitter Share on facebook
SOC Analyst Level 3
2025-06-11T08:46:24+00:00
Silensec
https://cdn.greatkenyanjobs.com/jsjobsdata/data/employer/comp_5561/logo/Silensec.png
FULL_TIME
 
Nairobi
Nairobi
00100
Kenya
Information Technology
Management
KES
 
MONTH
2025-06-20T17:00:00+00:00
 
Kenya
8

SOC Analyst Level 3 at Silensec

Silensec is an Information Security Management Consulting and Training company. Silensec was initially created to utilise the skills of renowned professionals in Information Security, as a direct response to what we felt was a lack of practical training in the industry. Today, we collaborate with hundreds of clients worldwide to deliver a wide range of Infor...

The SOC Analyst Level 3 is a senior cybersecurity professional responsible for leading advanced security investigations, threat hunting, incident response, and mentoring SOC Level 1 and Level 2 analysts. This role requires deep expertise in security operations, forensics, threat intelligence, and security tool optimization. The Level 3 analyst also collaborates with stakeholders to improve security posture and incident response processes.

This position involves working within a Managed Security Services Provider (MSSP) environment, managing security operations for multiple clients across various industries. You will ensure compliance with Service Level Agreements (SLAs), develop security strategies, and provide expert-level incident handling and response.

Key Responsibilities:

Incident Handling & Response:

  • Lead complex security investigations and incident response activities.
  • Perform deep-dive forensic analysis, malware analysis, and reverse engineering of security incidents.
  • Manage and coordinate incident containment, eradication, and recovery efforts. Conduct root cause analysis and post-incident reviews to improve defenses.

Threat Hunting & Intelligence:

  • Conduct proactive threat hunting activities using SIEM, EDR, and other security tools.
  • Develop and test hypotheses for threat scenarios based on the latest cyber threat intelligence.
  • Utilize threat intelligence feeds to enhance detection capabilities and improve SOC workflows.

Security Tool Optimization & Automation:

  • Fine-tune and configure SOC tools, including SIEM, EDR, IDS/IPS, SOAR, and firewalls for optimal performance.
  • Develop and automate security processes using scripting (e.g., Python, PowerShell, Bash) and SOAR platforms.
  • Identify gaps in security monitoring and implement improvements to enhance detection and response capabilities.

Collaboration & Escalation:

  • Act as the escalation point for complex security incidents that Level 1 and Level 2 analysts cannot resolve.
  • Collaborate with security architects, network engineers, and IT teams to enhance security controls.
  • Work closely with threat intelligence teams to analyze and respond to emerging threats.

Reporting & Documentation:

  • Maintain detailed documentation of security incidents, forensic findings, and response actions.
  • Generate executive reports and present security insights to management and stakeholders.
  • Improve and develop SOC playbooks, workflows, and best practices.

Security Improvement Initiatives:

  • Participate in red team/blue team exercises to enhance security preparedness.
  • Conduct training sessions and mentorship programs for Level 1 and Level 2 analysts.
  • Drive continuous improvement of SOC processes, policies, and incident response methodologies.

SOC Operations & Shift Management:

  • Provide leadership and direction during security incidents and crisis situations.
  • Participate in SOC shift rotations, including nights, weekends, and holidays.
  • Ensure timely response to security incidents while maintaining high-quality incident resolution.

People Skills:

  • Strong leadership skills with experience mentoring and training junior analysts.
  • Excellent problem-solving and decision-making abilities in high-pressure situations.
  • Ability to communicate complex security concepts to both technical and non technical audiences.
  • Collaborative mindset, working effectively across teams and departments.
  • Strong analytical, research, and documentation skills.

Qualifications:

  • Bachelor’s degree in Cybersecurity, Information Technology, or a related field (or equivalent experience).
  • 4+ years of experience in security operations, incident response, and cybersecurity analysis.
  • Strong understanding of cybersecurity frameworks (MITRE ATT&CK, NIST, ISO 27001).
  • Hands-on experience with SIEM, EDR, IDS/IPS, and other security tools.
  • Proficiency in scripting languages (Python, PowerShell, Bash) for automation and tool integration.
  • Deep knowledge of network security, threat intelligence, digital forensics, and malware analysis.
Incident Handling & Response: Lead complex security investigations and incident response activities. Perform deep-dive forensic analysis, malware analysis, and reverse engineering of security incidents. Manage and coordinate incident containment, eradication, and recovery efforts. Conduct root cause analysis and post-incident reviews to improve defenses. Threat Hunting & Intelligence: Conduct proactive threat hunting activities using SIEM, EDR, and other security tools. Develop and test hypotheses for threat scenarios based on the latest cyber threat intelligence. Utilize threat intelligence feeds to enhance detection capabilities and improve SOC workflows. Security Tool Optimization & Automation: Fine-tune and configure SOC tools, including SIEM, EDR, IDS/IPS, SOAR, and firewalls for optimal performance. Develop and automate security processes using scripting (e.g., Python, PowerShell, Bash) and SOAR platforms. Identify gaps in security monitoring and implement improvements to enhance detection and response capabilities. Collaboration & Escalation: Act as the escalation point for complex security incidents that Level 1 and Level 2 analysts cannot resolve. Collaborate with security architects, network engineers, and IT teams to enhance security controls. Work closely with threat intelligence teams to analyze and respond to emerging threats. Reporting & Documentation: Maintain detailed documentation of security incidents, forensic findings, and response actions. Generate executive reports and present security insights to management and stakeholders. Improve and develop SOC playbooks, workflows, and best practices. Security Improvement Initiatives: Participate in red team/blue team exercises to enhance security preparedness. Conduct training sessions and mentorship programs for Level 1 and Level 2 analysts. Drive continuous improvement of SOC processes, policies, and incident response methodologies. SOC Operations & Shift Management: Provide leadership and direction during security incidents and crisis situations. Participate in SOC shift rotations, including nights, weekends, and holidays. Ensure timely response to security incidents while maintaining high-quality incident resolution.
Strong leadership skills with experience mentoring and training junior analysts. Excellent problem-solving and decision-making abilities in high-pressure situations. Ability to communicate complex security concepts to both technical and non technical audiences. Collaborative mindset, working effectively across teams and departments. Strong analytical, research, and documentation skills.
Bachelor’s degree in Cybersecurity, Information Technology, or a related field (or equivalent experience). 4+ years of experience in security operations, incident response, and cybersecurity analysis. Strong understanding of cybersecurity frameworks (MITRE ATT&CK, NIST, ISO 27001). Hands-on experience with SIEM, EDR, IDS/IPS, and other security tools. Proficiency in scripting languages (Python, PowerShell, Bash) for automation and tool integration. Deep knowledge of network security, threat intelligence, digital forensics, and malware analysis.
bachelor degree
48
JOB-68494260d3321

Vacancy title:
SOC Analyst Level 3

[Type: FULL_TIME, Industry: Information Technology, Category: Management]

Jobs at:
Silensec

Deadline of this Job:
Friday, June 20 2025

Duty Station:
Nairobi | Nairobi | Kenya

Summary
Date Posted: Wednesday, June 11 2025, Base Salary: Not Disclosed

Similar Jobs in Kenya
Learn more about Silensec
Silensec jobs in Kenya

JOB DETAILS:
SOC Analyst Level 3 at Silensec
Silensec is an Information Security Management Consulting and Training company. Silensec was initially created to utilise the skills of renowned professionals in Information Security, as a direct response to what we felt was a lack of practical training in the industry. Today, we collaborate with hundreds of clients worldwide to deliver a wide range of Infor...

The SOC Analyst Level 3 is a senior cybersecurity professional responsible for leading advanced security investigations, threat hunting, incident response, and mentoring SOC Level 1 and Level 2 analysts. This role requires deep expertise in security operations, forensics, threat intelligence, and security tool optimization. The Level 3 analyst also collaborates with stakeholders to improve security posture and incident response processes.

This position involves working within a Managed Security Services Provider (MSSP) environment, managing security operations for multiple clients across various industries. You will ensure compliance with Service Level Agreements (SLAs), develop security strategies, and provide expert-level incident handling and response.

Key Responsibilities:

Incident Handling & Response:

  • Lead complex security investigations and incident response activities.
  • Perform deep-dive forensic analysis, malware analysis, and reverse engineering of security incidents.
  • Manage and coordinate incident containment, eradication, and recovery efforts. Conduct root cause analysis and post-incident reviews to improve defenses.

Threat Hunting & Intelligence:

  • Conduct proactive threat hunting activities using SIEM, EDR, and other security tools.
  • Develop and test hypotheses for threat scenarios based on the latest cyber threat intelligence.
  • Utilize threat intelligence feeds to enhance detection capabilities and improve SOC workflows.

Security Tool Optimization & Automation:

  • Fine-tune and configure SOC tools, including SIEM, EDR, IDS/IPS, SOAR, and firewalls for optimal performance.
  • Develop and automate security processes using scripting (e.g., Python, PowerShell, Bash) and SOAR platforms.
  • Identify gaps in security monitoring and implement improvements to enhance detection and response capabilities.

Collaboration & Escalation:

  • Act as the escalation point for complex security incidents that Level 1 and Level 2 analysts cannot resolve.
  • Collaborate with security architects, network engineers, and IT teams to enhance security controls.
  • Work closely with threat intelligence teams to analyze and respond to emerging threats.

Reporting & Documentation:

  • Maintain detailed documentation of security incidents, forensic findings, and response actions.
  • Generate executive reports and present security insights to management and stakeholders.
  • Improve and develop SOC playbooks, workflows, and best practices.

Security Improvement Initiatives:

  • Participate in red team/blue team exercises to enhance security preparedness.
  • Conduct training sessions and mentorship programs for Level 1 and Level 2 analysts.
  • Drive continuous improvement of SOC processes, policies, and incident response methodologies.

SOC Operations & Shift Management:

  • Provide leadership and direction during security incidents and crisis situations.
  • Participate in SOC shift rotations, including nights, weekends, and holidays.
  • Ensure timely response to security incidents while maintaining high-quality incident resolution.

People Skills:

  • Strong leadership skills with experience mentoring and training junior analysts.
  • Excellent problem-solving and decision-making abilities in high-pressure situations.
  • Ability to communicate complex security concepts to both technical and non technical audiences.
  • Collaborative mindset, working effectively across teams and departments.
  • Strong analytical, research, and documentation skills.

Qualifications:

  • Bachelor’s degree in Cybersecurity, Information Technology, or a related field (or equivalent experience).
  • 4+ years of experience in security operations, incident response, and cybersecurity analysis.
  • Strong understanding of cybersecurity frameworks (MITRE ATT&CK, NIST, ISO 27001).
  • Hands-on experience with SIEM, EDR, IDS/IPS, and other security tools.
  • Proficiency in scripting languages (Python, PowerShell, Bash) for automation and tool integration.
  • Deep knowledge of network security, threat intelligence, digital forensics, and malware analysis.

 

Work Hours: 8

Experience in Months: 48

Level of Education: bachelor degree

Job application procedure

Interested and Qualified? Click Here to Apply

 

All Jobs | QUICK ALERT SUBSCRIPTION

Job Info
Job Category: Management jobs in Kenya
Job Type: Full-time
Deadline of this Job: Friday, June 20 2025
Duty Station: Nairobi, Kenya
Posted: 11-06-2025
No of Jobs: 1
Start Publishing: 11-06-2025
Stop Publishing (Put date of 2030): 20-06-2025
Apply Now
Notification Board

Join a Focused Community on job search to uncover both advertised and non-advertised jobs that you may not be aware of. A jobs WhatsApp Group Community can ensure that you know the opportunities happening around you and a jobs Facebook Group Community provides an opportunity to discuss with employers who need to fill urgent position. Click the links to join. You can view previously sent Email Alerts here incase you missed them and Subscribe so that you never miss out.

Caution: Never Pay Money in a Recruitment Process.

Some smart scams can trick you into paying for Psychometric Tests.