SOC Analyst Level 2 job at Silensec
New
Website :
3 Days Ago
Linkedid Twitter Share on facebook
SOC Analyst Level 2
2025-06-10T17:36:52+00:00
Silensec
https://cdn.greatkenyanjobs.com/jsjobsdata/data/employer/comp_5561/logo/Silensec.png
FULL_TIME
 
Kenya
Nairobi
00100
Kenya
Information Technology
Computer & IT
KES
 
MONTH
2025-06-24T17:00:00+00:00
 
Kenya
8

The SOC Analyst Level 2 is responsible for the advanced analysis and investigation of security incidents, providing guidance to Level 1 analysts, and assisting in the development and implementation of security controls and measures. This role plays a critical part in the detection and mitigation of security threats.

This position also involves working within a Managed Security Services Provider (MSSP) environment, where you will manage security operations for multiple clients across various industries. You will be required to adapt to different client environments, adhere to Service Level Agreements (SLAs), and prioritize incidents effectively.

Key Responsibilities:

Incident Analysis and Response:

  • Investigate escalated security incidents from L1 analysts.
  • Perform detailed analysis of logs, alerts, and incidents using SIEM tools and other monitoring solutions.
  • Coordinate and execute containment, eradication, and recovery measures for identified threats.
  • Document and report findings, including root cause analysis and recommendations for prevention.
  • Participate in SOC shift rotations, including nights, weekends, and holidays.

Threat Hunting:

  • Proactively search for signs of potential threats and vulnerabilities in the environment.
  • Develop hypotheses for threat scenarios and test them using available tools and data.

Tool and Process Optimization:

  • Fine-tune and configure SOC tools (e.g., SIEM, EDR, IDS/IPS) for optimal performance.
  • Work with threat intelligence feeds to enhance detection capabilities.

Collaboration and Escalation:

  • Collaborate with L3 analysts and other teams for complex investigations or escalations.
  • Provide mentorship and guidance to L1 analysts for skill development and efficiency.

Reporting and Documentation:

  • Maintain detailed documentation of incidents, processes, and investigations.
  • Generate regular reports for management on security posture, metrics, and incident trends.

Security Improvement Initiatives:

  • Participate in post-incident reviews and recommend changes to policies, procedures, or configurations.
  • Contribute to the development and improvement of SOC playbooks.
  • Participate in SOC shift rotations, including nights, weekends, and holidays.

People Skills:

  • Demonstrate strong leadership skills, providing guidance and mentorship to Level 1 analysts.
  • Communicate effectively with team members, stakeholders, and external parties, ensuring clear understanding and documentation of security incidents and actions taken.
  • Exhibit excellent interpersonal skills, including the ability to manage and resolve conflicts, and foster a positive team environment.
  • Collaborate effectively with cross-functional teams to ensure cohesive and efficient incident response and mitigation efforts.
  • Show strong presentation skills, capable of conveying complex technical information to both technical and non-technical audiences.
  • Strong analytical and problem-solving skills.
  • Excellent communication and leadership skills.

Qualifications:

  • Bachelor's degree in Cybersecurity, Information Technology, or related field, or equivalent work experience.
  • 2-4 years of experience in a security operations or similar role.
  • In-depth understanding of cybersecurity principles, techniques, and best practices.
  • Hands on experience with security tools and technologies (e.g., SIEM, IDS/IPS, firewalls, endpoint protection).
  • SIEM Tools such as – Wazuh, ELK, OpenSource SOAR •
Incident Analysis and Response: Investigate escalated security incidents from L1 analysts. Perform detailed analysis of logs, alerts, and incidents using SIEM tools and other monitoring solutions. Coordinate and execute containment, eradication, and recovery measures for identified threats. Document and report findings, including root cause analysis and recommendations for prevention. Participate in SOC shift rotations, including nights, weekends, and holidays. Threat Hunting: Proactively search for signs of potential threats and vulnerabilities in the environment. Develop hypotheses for threat scenarios and test them using available tools and data. Tool and Process Optimization: Fine-tune and configure SOC tools (e.g., SIEM, EDR, IDS/IPS) for optimal performance. Work with threat intelligence feeds to enhance detection capabilities. Collaboration and Escalation: Collaborate with L3 analysts and other teams for complex investigations or escalations. Provide mentorship and guidance to L1 analysts for skill development and efficiency. Reporting and Documentation: Maintain detailed documentation of incidents, processes, and investigations. Generate regular reports for management on security posture, metrics, and incident trends. Security Improvement Initiatives: Participate in post-incident reviews and recommend changes to policies, procedures, or configurations. Contribute to the development and improvement of SOC playbooks. Participate in SOC shift rotations, including nights, weekends, and holidays. People Skills: Demonstrate strong leadership skills, providing guidance and mentorship to Level 1 analysts. Communicate effectively with team members, stakeholders, and external parties, ensuring clear understanding and documentation of security incidents and actions taken. Exhibit excellent interpersonal skills, including the ability to manage and resolve conflicts, and foster a positive team environment. Collaborate effectively with cross-functional teams to ensure cohesive and efficient incident response and mitigation efforts. Show strong presentation skills, capable of conveying complex technical information to both technical and non-technical audiences. Strong analytical and problem-solving skills. Excellent communication and leadership skills.
 
Bachelor's degree in Cybersecurity, Information Technology, or related field, or equivalent work experience. 2-4 years of experience in a security operations or similar role. In-depth understanding of cybersecurity principles, techniques, and best practices. Hands on experience with security tools and technologies (e.g., SIEM, IDS/IPS, firewalls, endpoint protection). SIEM Tools such as – Wazuh, ELK, OpenSource SOAR •
bachelor degree
24
JOB-68486d343814a

Vacancy title:
SOC Analyst Level 2

[Type: FULL_TIME, Industry: Information Technology, Category: Computer & IT]

Jobs at:
Silensec

Deadline of this Job:
Tuesday, June 24 2025

Duty Station:
Kenya | Nairobi | Kenya

Summary
Date Posted: Tuesday, June 10 2025, Base Salary: Not Disclosed

Similar Jobs in Kenya
Learn more about Silensec
Silensec jobs in Kenya

JOB DETAILS:

The SOC Analyst Level 2 is responsible for the advanced analysis and investigation of security incidents, providing guidance to Level 1 analysts, and assisting in the development and implementation of security controls and measures. This role plays a critical part in the detection and mitigation of security threats.

This position also involves working within a Managed Security Services Provider (MSSP) environment, where you will manage security operations for multiple clients across various industries. You will be required to adapt to different client environments, adhere to Service Level Agreements (SLAs), and prioritize incidents effectively.

Key Responsibilities:

Incident Analysis and Response:

  • Investigate escalated security incidents from L1 analysts.
  • Perform detailed analysis of logs, alerts, and incidents using SIEM tools and other monitoring solutions.
  • Coordinate and execute containment, eradication, and recovery measures for identified threats.
  • Document and report findings, including root cause analysis and recommendations for prevention.
  • Participate in SOC shift rotations, including nights, weekends, and holidays.

Threat Hunting:

  • Proactively search for signs of potential threats and vulnerabilities in the environment.
  • Develop hypotheses for threat scenarios and test them using available tools and data.

Tool and Process Optimization:

  • Fine-tune and configure SOC tools (e.g., SIEM, EDR, IDS/IPS) for optimal performance.
  • Work with threat intelligence feeds to enhance detection capabilities.

Collaboration and Escalation:

  • Collaborate with L3 analysts and other teams for complex investigations or escalations.
  • Provide mentorship and guidance to L1 analysts for skill development and efficiency.

Reporting and Documentation:

  • Maintain detailed documentation of incidents, processes, and investigations.
  • Generate regular reports for management on security posture, metrics, and incident trends.

Security Improvement Initiatives:

  • Participate in post-incident reviews and recommend changes to policies, procedures, or configurations.
  • Contribute to the development and improvement of SOC playbooks.
  • Participate in SOC shift rotations, including nights, weekends, and holidays.

People Skills:

  • Demonstrate strong leadership skills, providing guidance and mentorship to Level 1 analysts.
  • Communicate effectively with team members, stakeholders, and external parties, ensuring clear understanding and documentation of security incidents and actions taken.
  • Exhibit excellent interpersonal skills, including the ability to manage and resolve conflicts, and foster a positive team environment.
  • Collaborate effectively with cross-functional teams to ensure cohesive and efficient incident response and mitigation efforts.
  • Show strong presentation skills, capable of conveying complex technical information to both technical and non-technical audiences.
  • Strong analytical and problem-solving skills.
  • Excellent communication and leadership skills.

Qualifications:

  • Bachelor's degree in Cybersecurity, Information Technology, or related field, or equivalent work experience.
  • 2-4 years of experience in a security operations or similar role.
  • In-depth understanding of cybersecurity principles, techniques, and best practices.
  • Hands on experience with security tools and technologies (e.g., SIEM, IDS/IPS, firewalls, endpoint protection).
  • SIEM Tools such as – Wazuh, ELK, OpenSource SOAR •

 

Work Hours: 8

Experience in Months: 24

Level of Education: bachelor degree

Job application procedure

Interested and qualified? Go to Silensec on www.linkedin.com to apply

 

All Jobs | QUICK ALERT SUBSCRIPTION

Job Info
Job Category: Computer/ IT jobs in Kenya
Job Type: Full-time
Deadline of this Job: Tuesday, June 24 2025
Duty Station: Nairobi | Kenya
Posted: 10-06-2025
No of Jobs: 1
Start Publishing: 10-06-2025
Stop Publishing (Put date of 2030): 10-06-2031
Apply Now
Notification Board

Join a Focused Community on job search to uncover both advertised and non-advertised jobs that you may not be aware of. A jobs WhatsApp Group Community can ensure that you know the opportunities happening around you and a jobs Facebook Group Community provides an opportunity to discuss with employers who need to fill urgent position. Click the links to join. You can view previously sent Email Alerts here incase you missed them and Subscribe so that you never miss out.

Caution: Never Pay Money in a Recruitment Process.

Some smart scams can trick you into paying for Psychometric Tests.