SOC Analyst Level 3
2025-06-11T08:46:24+00:00
Silensec
https://cdn.greatkenyanjobs.com/jsjobsdata/data/employer/comp_5561/logo/Silensec.png
https://www.greatkenyanjobs.com/jobs
FULL_TIME
Nairobi
Nairobi
00100
Kenya
Information Technology
Management
2025-06-20T17:00:00+00:00
Kenya
8
SOC Analyst Level 3 at Silensec
Silensec is an Information Security Management Consulting and Training company. Silensec was initially created to utilise the skills of renowned professionals in Information Security, as a direct response to what we felt was a lack of practical training in the industry. Today, we collaborate with hundreds of clients worldwide to deliver a wide range of Infor...
The SOC Analyst Level 3 is a senior cybersecurity professional responsible for leading advanced security investigations, threat hunting, incident response, and mentoring SOC Level 1 and Level 2 analysts. This role requires deep expertise in security operations, forensics, threat intelligence, and security tool optimization. The Level 3 analyst also collaborates with stakeholders to improve security posture and incident response processes.
This position involves working within a Managed Security Services Provider (MSSP) environment, managing security operations for multiple clients across various industries. You will ensure compliance with Service Level Agreements (SLAs), develop security strategies, and provide expert-level incident handling and response.
Key Responsibilities:
Incident Handling & Response:
- Lead complex security investigations and incident response activities.
- Perform deep-dive forensic analysis, malware analysis, and reverse engineering of security incidents.
- Manage and coordinate incident containment, eradication, and recovery efforts. Conduct root cause analysis and post-incident reviews to improve defenses.
Threat Hunting & Intelligence:
- Conduct proactive threat hunting activities using SIEM, EDR, and other security tools.
- Develop and test hypotheses for threat scenarios based on the latest cyber threat intelligence.
- Utilize threat intelligence feeds to enhance detection capabilities and improve SOC workflows.
Security Tool Optimization & Automation:
- Fine-tune and configure SOC tools, including SIEM, EDR, IDS/IPS, SOAR, and firewalls for optimal performance.
- Develop and automate security processes using scripting (e.g., Python, PowerShell, Bash) and SOAR platforms.
- Identify gaps in security monitoring and implement improvements to enhance detection and response capabilities.
Collaboration & Escalation:
- Act as the escalation point for complex security incidents that Level 1 and Level 2 analysts cannot resolve.
- Collaborate with security architects, network engineers, and IT teams to enhance security controls.
- Work closely with threat intelligence teams to analyze and respond to emerging threats.
Reporting & Documentation:
- Maintain detailed documentation of security incidents, forensic findings, and response actions.
- Generate executive reports and present security insights to management and stakeholders.
- Improve and develop SOC playbooks, workflows, and best practices.
Security Improvement Initiatives:
- Participate in red team/blue team exercises to enhance security preparedness.
- Conduct training sessions and mentorship programs for Level 1 and Level 2 analysts.
- Drive continuous improvement of SOC processes, policies, and incident response methodologies.
SOC Operations & Shift Management:
- Provide leadership and direction during security incidents and crisis situations.
- Participate in SOC shift rotations, including nights, weekends, and holidays.
- Ensure timely response to security incidents while maintaining high-quality incident resolution.
People Skills:
- Strong leadership skills with experience mentoring and training junior analysts.
- Excellent problem-solving and decision-making abilities in high-pressure situations.
- Ability to communicate complex security concepts to both technical and non technical audiences.
- Collaborative mindset, working effectively across teams and departments.
- Strong analytical, research, and documentation skills.
Qualifications:
- Bachelor’s degree in Cybersecurity, Information Technology, or a related field (or equivalent experience).
- 4+ years of experience in security operations, incident response, and cybersecurity analysis.
- Strong understanding of cybersecurity frameworks (MITRE ATT&CK, NIST, ISO 27001).
- Hands-on experience with SIEM, EDR, IDS/IPS, and other security tools.
- Proficiency in scripting languages (Python, PowerShell, Bash) for automation and tool integration.
- Deep knowledge of network security, threat intelligence, digital forensics, and malware analysis.
Incident Handling & Response: Lead complex security investigations and incident response activities. Perform deep-dive forensic analysis, malware analysis, and reverse engineering of security incidents. Manage and coordinate incident containment, eradication, and recovery efforts. Conduct root cause analysis and post-incident reviews to improve defenses. Threat Hunting & Intelligence: Conduct proactive threat hunting activities using SIEM, EDR, and other security tools. Develop and test hypotheses for threat scenarios based on the latest cyber threat intelligence. Utilize threat intelligence feeds to enhance detection capabilities and improve SOC workflows. Security Tool Optimization & Automation: Fine-tune and configure SOC tools, including SIEM, EDR, IDS/IPS, SOAR, and firewalls for optimal performance. Develop and automate security processes using scripting (e.g., Python, PowerShell, Bash) and SOAR platforms. Identify gaps in security monitoring and implement improvements to enhance detection and response capabilities. Collaboration & Escalation: Act as the escalation point for complex security incidents that Level 1 and Level 2 analysts cannot resolve. Collaborate with security architects, network engineers, and IT teams to enhance security controls. Work closely with threat intelligence teams to analyze and respond to emerging threats. Reporting & Documentation: Maintain detailed documentation of security incidents, forensic findings, and response actions. Generate executive reports and present security insights to management and stakeholders. Improve and develop SOC playbooks, workflows, and best practices. Security Improvement Initiatives: Participate in red team/blue team exercises to enhance security preparedness. Conduct training sessions and mentorship programs for Level 1 and Level 2 analysts. Drive continuous improvement of SOC processes, policies, and incident response methodologies. SOC Operations & Shift Management: Provide leadership and direction during security incidents and crisis situations. Participate in SOC shift rotations, including nights, weekends, and holidays. Ensure timely response to security incidents while maintaining high-quality incident resolution.
Strong leadership skills with experience mentoring and training junior analysts. Excellent problem-solving and decision-making abilities in high-pressure situations. Ability to communicate complex security concepts to both technical and non technical audiences. Collaborative mindset, working effectively across teams and departments. Strong analytical, research, and documentation skills.
Bachelor’s degree in Cybersecurity, Information Technology, or a related field (or equivalent experience). 4+ years of experience in security operations, incident response, and cybersecurity analysis. Strong understanding of cybersecurity frameworks (MITRE ATT&CK, NIST, ISO 27001). Hands-on experience with SIEM, EDR, IDS/IPS, and other security tools. Proficiency in scripting languages (Python, PowerShell, Bash) for automation and tool integration. Deep knowledge of network security, threat intelligence, digital forensics, and malware analysis.
JOB-68494260d3321
Vacancy title:
SOC Analyst Level 3
[Type: FULL_TIME, Industry: Information Technology, Category: Management]
Jobs at:
Silensec
Deadline of this Job:
Friday, June 20 2025
Duty Station:
Nairobi | Nairobi | Kenya
Summary
Date Posted: Wednesday, June 11 2025, Base Salary: Not Disclosed
Similar Jobs in Kenya
Learn more about Silensec
Silensec jobs in Kenya
JOB DETAILS:
SOC Analyst Level 3 at Silensec
Silensec is an Information Security Management Consulting and Training company. Silensec was initially created to utilise the skills of renowned professionals in Information Security, as a direct response to what we felt was a lack of practical training in the industry. Today, we collaborate with hundreds of clients worldwide to deliver a wide range of Infor...
The SOC Analyst Level 3 is a senior cybersecurity professional responsible for leading advanced security investigations, threat hunting, incident response, and mentoring SOC Level 1 and Level 2 analysts. This role requires deep expertise in security operations, forensics, threat intelligence, and security tool optimization. The Level 3 analyst also collaborates with stakeholders to improve security posture and incident response processes.
This position involves working within a Managed Security Services Provider (MSSP) environment, managing security operations for multiple clients across various industries. You will ensure compliance with Service Level Agreements (SLAs), develop security strategies, and provide expert-level incident handling and response.
Key Responsibilities:
Incident Handling & Response:
- Lead complex security investigations and incident response activities.
- Perform deep-dive forensic analysis, malware analysis, and reverse engineering of security incidents.
- Manage and coordinate incident containment, eradication, and recovery efforts. Conduct root cause analysis and post-incident reviews to improve defenses.
Threat Hunting & Intelligence:
- Conduct proactive threat hunting activities using SIEM, EDR, and other security tools.
- Develop and test hypotheses for threat scenarios based on the latest cyber threat intelligence.
- Utilize threat intelligence feeds to enhance detection capabilities and improve SOC workflows.
Security Tool Optimization & Automation:
- Fine-tune and configure SOC tools, including SIEM, EDR, IDS/IPS, SOAR, and firewalls for optimal performance.
- Develop and automate security processes using scripting (e.g., Python, PowerShell, Bash) and SOAR platforms.
- Identify gaps in security monitoring and implement improvements to enhance detection and response capabilities.
Collaboration & Escalation:
- Act as the escalation point for complex security incidents that Level 1 and Level 2 analysts cannot resolve.
- Collaborate with security architects, network engineers, and IT teams to enhance security controls.
- Work closely with threat intelligence teams to analyze and respond to emerging threats.
Reporting & Documentation:
- Maintain detailed documentation of security incidents, forensic findings, and response actions.
- Generate executive reports and present security insights to management and stakeholders.
- Improve and develop SOC playbooks, workflows, and best practices.
Security Improvement Initiatives:
- Participate in red team/blue team exercises to enhance security preparedness.
- Conduct training sessions and mentorship programs for Level 1 and Level 2 analysts.
- Drive continuous improvement of SOC processes, policies, and incident response methodologies.
SOC Operations & Shift Management:
- Provide leadership and direction during security incidents and crisis situations.
- Participate in SOC shift rotations, including nights, weekends, and holidays.
- Ensure timely response to security incidents while maintaining high-quality incident resolution.
People Skills:
- Strong leadership skills with experience mentoring and training junior analysts.
- Excellent problem-solving and decision-making abilities in high-pressure situations.
- Ability to communicate complex security concepts to both technical and non technical audiences.
- Collaborative mindset, working effectively across teams and departments.
- Strong analytical, research, and documentation skills.
Qualifications:
- Bachelor’s degree in Cybersecurity, Information Technology, or a related field (or equivalent experience).
- 4+ years of experience in security operations, incident response, and cybersecurity analysis.
- Strong understanding of cybersecurity frameworks (MITRE ATT&CK, NIST, ISO 27001).
- Hands-on experience with SIEM, EDR, IDS/IPS, and other security tools.
- Proficiency in scripting languages (Python, PowerShell, Bash) for automation and tool integration.
- Deep knowledge of network security, threat intelligence, digital forensics, and malware analysis.
Work Hours: 8
Experience in Months: 48
Level of Education: bachelor degree
Job application procedure
Interested and Qualified? Click Here to Apply
All Jobs | QUICK ALERT SUBSCRIPTION