SOC – Blue Team Content Creator at Silensec job at Silensec
Website :
5 Days Ago
Linkedid Twitter Share on facebook
SOC – Blue Team Content Creator at Silensec
2025-06-11T08:51:57+00:00
Silensec
https://cdn.greatkenyanjobs.com/jsjobsdata/data/employer/comp_5561/logo/Silensec.png
FULL_TIME
 
Nairobi
Nairobi
00100
Kenya
Information Technology
Media, Communications & Writing
KES
 
MONTH
2025-06-20T17:00:00+00:00
 
Kenya
8

SOC – Blue Team Content Creator at Silensec

Silensec is an Information Security Management Consulting and Training company. Silensec was initially created to utilise the skills of renowned professionals in Information Security, as a direct response to what we felt was a lack of practical training in the industry. Today, we collaborate with hundreds of clients worldwide to deliver a wide range of Infor...

We are seeking a skilled and passionate Blue Team Content Creator with hands-on experience working in a Security Operations Center (SOC). The ideal candidate will be responsible for both SOC operations anontent creation, developing immersive defensive exercises within virtual environments.

This role involves simulating real-world threats, designing practical assessments, and creating engaging training content focused on incident response, threat hunting, vulnerability management, and security tooling (SIEM/EDR/IDS).

Key Responsibilities:

  • Design attack scenarios mirroring Tactics, Techniques, and Procedures (TTPs) of advanced adversaries.
  • Assist in SOC operations as needed and contribute to the enhancement of processes and functions within the SOC.
  • Develop and maintain virtual labs with built-in vulnerabilities, logs, and defensive tools (e.g., ELK Stack, Wazuh, Wireshark, Velociraptor).
  • Create hands-on exercises and assessments aligned with industry frameworks such as NIST NICE, MITRE ATT&CK, and CIS Controls.
  • Develop training material that enhances Blue Team skills, including log analysis, forensics, network monitoring, and security hardening.
  • Collaborate with SOC teams, cybersecurity researchers, and instructional designers to ensure engaging and realistic training experiences.
  • Stay up to date with emerging threats, security tools, and industry best practices to enhance training content.

Requirements:

  • Hands-on experience working in a Security Operations Center (SOC) with a focus on threat detection, response, and mitigation.
  • Proven experience in cybersecurity content creation, including cyber labs and threat simulations.
  • Strong Blue Team skills, including log analysis, forensic investigation, network monitoring, and system hardening.
  • Hands-on experience with security tools, including SIEMs, EDR solutions, IDS/IPS, and forensic utilities.
  • Knowledge of adversary TTPs and experience in developing threat simulation exercises.

Qualifications:

  • Bachelor's degree in Cybersecurity, Information Technology, or related field, or equivalent work experience.
  • 2-4 years of experience in a security operations or similar role.
  • Familiarity with virtualization technologies (OpenStack, Docker, VMware).
  • Experience in malware reverse engineering, digital forensics, or red teaming techniques.
  • Background in cybersecurity education/training roles.

 

Design attack scenarios mirroring Tactics, Techniques, and Procedures (TTPs) of advanced adversaries. Assist in SOC operations as needed and contribute to the enhancement of processes and functions within the SOC. Develop and maintain virtual labs with built-in vulnerabilities, logs, and defensive tools (e.g., ELK Stack, Wazuh, Wireshark, Velociraptor). Create hands-on exercises and assessments aligned with industry frameworks such as NIST NICE, MITRE ATT&CK, and CIS Controls. Develop training material that enhances Blue Team skills, including log analysis, forensics, network monitoring, and security hardening. Collaborate with SOC teams, cybersecurity researchers, and instructional designers to ensure engaging and realistic training experiences. Stay up to date with emerging threats, security tools, and industry best practices to enhance training content.
 
Bachelor's degree in Cybersecurity, Information Technology, or related field, or equivalent work experience. 2-4 years of experience in a security operations or similar role. Familiarity with virtualization technologies (OpenStack, Docker, VMware). Experience in malware reverse engineering, digital forensics, or red teaming techniques. Background in cybersecurity education/training roles. Hands-on experience working in a Security Operations Center (SOC) with a focus on threat detection, response, and mitigation. Proven experience in cybersecurity content creation, including cyber labs and threat simulations. Strong Blue Team skills, including log analysis, forensic investigation, network monitoring, and system hardening. Hands-on experience with security tools, including SIEMs, EDR solutions, IDS/IPS, and forensic utilities. Knowledge of adversary TTPs and experience in developing threat simulation exercises.
bachelor degree
24
JOB-684943ad4307a

Vacancy title:
SOC – Blue Team Content Creator at Silensec

[Type: FULL_TIME, Industry: Information Technology, Category: Media, Communications & Writing]

Jobs at:
Silensec

Deadline of this Job:
Friday, June 20 2025

Duty Station:
Nairobi | Nairobi | Kenya

Summary
Date Posted: Wednesday, June 11 2025, Base Salary: Not Disclosed

Similar Jobs in Kenya
Learn more about Silensec
Silensec jobs in Kenya

JOB DETAILS:
SOC – Blue Team Content Creator at Silensec
Silensec is an Information Security Management Consulting and Training company. Silensec was initially created to utilise the skills of renowned professionals in Information Security, as a direct response to what we felt was a lack of practical training in the industry. Today, we collaborate with hundreds of clients worldwide to deliver a wide range of Infor...

We are seeking a skilled and passionate Blue Team Content Creator with hands-on experience working in a Security Operations Center (SOC). The ideal candidate will be responsible for both SOC operations anontent creation, developing immersive defensive exercises within virtual environments.

This role involves simulating real-world threats, designing practical assessments, and creating engaging training content focused on incident response, threat hunting, vulnerability management, and security tooling (SIEM/EDR/IDS).

Key Responsibilities:

  • Design attack scenarios mirroring Tactics, Techniques, and Procedures (TTPs) of advanced adversaries.
  • Assist in SOC operations as needed and contribute to the enhancement of processes and functions within the SOC.
  • Develop and maintain virtual labs with built-in vulnerabilities, logs, and defensive tools (e.g., ELK Stack, Wazuh, Wireshark, Velociraptor).
  • Create hands-on exercises and assessments aligned with industry frameworks such as NIST NICE, MITRE ATT&CK, and CIS Controls.
  • Develop training material that enhances Blue Team skills, including log analysis, forensics, network monitoring, and security hardening.
  • Collaborate with SOC teams, cybersecurity researchers, and instructional designers to ensure engaging and realistic training experiences.
  • Stay up to date with emerging threats, security tools, and industry best practices to enhance training content.

Requirements:

  • Hands-on experience working in a Security Operations Center (SOC) with a focus on threat detection, response, and mitigation.
  • Proven experience in cybersecurity content creation, including cyber labs and threat simulations.
  • Strong Blue Team skills, including log analysis, forensic investigation, network monitoring, and system hardening.
  • Hands-on experience with security tools, including SIEMs, EDR solutions, IDS/IPS, and forensic utilities.
  • Knowledge of adversary TTPs and experience in developing threat simulation exercises.

Qualifications:

  • Bachelor's degree in Cybersecurity, Information Technology, or related field, or equivalent work experience.
  • 2-4 years of experience in a security operations or similar role.
  • Familiarity with virtualization technologies (OpenStack, Docker, VMware).
  • Experience in malware reverse engineering, digital forensics, or red teaming techniques.
  • Background in cybersecurity education/training roles.

 

Work Hours: 8

Experience in Months: 24

Level of Education: bachelor degree

Job application procedure

Interested and qualified? Click Here to Apply

 

All Jobs | QUICK ALERT SUBSCRIPTION

Job Info
Job Category: Communications/ Public Relations jobs in Kenya
Job Type: Full-time
Deadline of this Job: Friday, June 20 2025
Duty Station: Nairobi, Kenya
Posted: 11-06-2025
No of Jobs: 1
Start Publishing: 11-06-2025
Stop Publishing (Put date of 2030): 20-06-2025
Apply Now
Notification Board

Join a Focused Community on job search to uncover both advertised and non-advertised jobs that you may not be aware of. A jobs WhatsApp Group Community can ensure that you know the opportunities happening around you and a jobs Facebook Group Community provides an opportunity to discuss with employers who need to fill urgent position. Click the links to join. You can view previously sent Email Alerts here incase you missed them and Subscribe so that you never miss out.

Caution: Never Pay Money in a Recruitment Process.

Some smart scams can trick you into paying for Psychometric Tests.