SOC Analyst (L2) job at Equity Bank
Website :
5 Days Ago
Linkedid Twitter Share on facebook
SOC Analyst (L2)
2026-02-02T10:12:36+00:00
Equity Bank
https://cdn.greatkenyanjobs.com/jsjobsdata/data/employer/comp_7833/logo/Equity%20Bank.png
FULL_TIME
Nairobi
Nairobi
00100
Kenya
Banking
Computer & IT, Protective Services
KES
MONTH
2026-02-13T17:00:00+00:00
8

Role Purpose

The SOC Analyst Level 2 is responsible for advanced monitoring, analysis, investigation, and coordination of information security incidents across Equity Group. The role builds Level 1 SOC capabilities and focuses on incident management, technical analysis, escalation, forensic investigation, and collaboration with internal and external stakeholders to protect the confidentiality, integrity, and availability of Group information assets.

Key Responsibilities

  • Lead and manage security incident activities from identification through containment, eradication, and recovery.
  • Assess incidents against predefined criteria and determine when escalation to a Declared Security Incident is required.
  • Coordinate incident response activities including escalations, notifications, stakeholder communications, and incident bridges.
  • Communicate the impact and nature of security incidents in business and operational continuity terms.
  • Conduct advanced technical assessments of security incidents including malware analysis, packet-level analysis, and system-level forensic investigations.
  • Perform network traffic analysis to extract content and context from packet captures.
  • Reconstruct sessions, retrieve files from network captures, and support forensic investigations.
  • Interpret vulnerability reports and determine effective detection and mitigation approaches.
  • Assess severity levels of security threats (incidents, vulnerabilities, malicious code) and ensure timely notification and escalation.
  • Monitor, manage, and correlate information from public and private threat intelligence sources.
  • Identify emerging threats and recommend preventive or detective control enhancements.
  • Demonstrate a strong understanding of Equity Group security controls, their configuration, and intended purpose.
  • Understand log correlation rules, thresholds, and workflows that drive SOC operations.
  • Recommend configuration changes to security controls and clearly articulate associated business risks and technical impacts.
  • Understand the architecture, data flows, and end-to-end incident management processes within Equity Group.
  • Demonstrate advanced knowledge of networking concepts, TCP/IP protocol internals (TTL, flags, fragmentation, RWIN), routing, and infrastructure protocols.
  • Interpret the impact of network access control lists (ACLs) on application protocols.
  • Understand modern distributed authentication systems (Kerberos, RADIUS, TACACS, X.509) and interpret authentication sessions.
  • Demonstrate working knowledge of Windows, Unix, and Linux operating systems.
  • Perform advanced packet capture and analysis using tools such as Wireshark, tcpdump, Snort, and Suricata.
  • Generate and interpret advanced port scans.
  • Maintain and secure server hosts and virtual machine images used for analysis and testing.
  • Locate and analyze system and application logs across major operating systems.
  • Demonstrate a strong understanding of computer security forensics and vulnerability analysis.
  • Explain the differences between risk, vulnerability, exploit, and exposure to technical and non-technical audiences.
  • Recognize modern exploit and payload delivery mechanisms including XSS, CSRF, and shellcode.
  • Demonstrate general scripting and data analysis skills.
  • Understand execution flow in modern programming and scripting languages.
  • Read and interpret scripts written by others.
  • Demonstrate understanding of advanced SQL queries.
  • Maintain and contribute to SOC technical documentation, procedures, and standards.
  • Produce situation analysis and post-incident reports to support continuous improvement.
  • Use Wiki platforms, HTML, diagrams, and flowcharts to clearly document processes and workflows.
  • Work closely with SOC Analysts (L1–L3), ICT teams, and other InfoSec sub-functions.
  • Participate actively in shift handovers, daily briefings, and incident reviews.
  • Contribute to inter-analyst training through documentation, knowledge sharing, and mentoring.
  • Maintain an Individual Development Plan (IDP) aligned to career progression within Equity Group.
  • Incident handling efficiency and quality, including resolution and escalation accuracy.
  • Adherence to SOC processes, SLAs, and escalation procedures.
  • Quality of analysis, documentation, and reporting.
  • Contribution to knowledge sharing, training, and continuous improvement.
  • Contribute meaningful shift handover notes with context and insights.
  • Participate in shift forums, team discussions, and SOC improvement initiatives.
  • Identify and report SIEM or tooling issues.

Qualifications

Key Technical Skills and Competencies

  • Proficient in SIEM, EDR, NDR, and SOAR platforms for alert triage and incident response.
  • Strong understanding of threat detection, log analysis, and MITRE ATT&CK techniques.
  • Experience with incident escalation, containment actions, and root-cause analysis.
  • Knowledge of security controls across network, endpoint, cloud, and identity environments.
  • Clear communication, effective handover, and collaboration within SOC and cross-functional teams

Experience Requirements

  • Experience with SIEM, SOAR, EDR, and forensic investigation tools in a production environment.
  • Demonstrated experience in incident response coordination, escalation, and reporting.
  • Experience in financial services or other regulated environments is an added advantage.
  • Professional certifications such as GCIA, GCIH, CEH, Security+, or equivalent are highly desirable.
  • Exposure to threat intelligence analysis, vulnerability management, and security control tuning.
  • Experience in scripting, network packet analysis, and forensic investigation.
  • Proven ability to document technical procedures and contribute to knowledge management.

Academic Qualifications and Certifications

  • Bachelor’s degree in information security, Computer Science, IT, or related discipline.
  • 3–5 years’ experience in a SOC, cyber defense, or security operations environment.
  • Lead and manage security incident activities from identification through containment, eradication, and recovery.
  • Assess incidents against predefined criteria and determine when escalation to a Declared Security Incident is required.
  • Coordinate incident response activities including escalations, notifications, stakeholder communications, and incident bridges.
  • Communicate the impact and nature of security incidents in business and operational continuity terms.
  • Conduct advanced technical assessments of security incidents including malware analysis, packet-level analysis, and system-level forensic investigations.
  • Perform network traffic analysis to extract content and context from packet captures.
  • Reconstruct sessions, retrieve files from network captures, and support forensic investigations.
  • Interpret vulnerability reports and determine effective detection and mitigation approaches.
  • Assess severity levels of security threats (incidents, vulnerabilities, malicious code) and ensure timely notification and escalation.
  • Monitor, manage, and correlate information from public and private threat intelligence sources.
  • Identify emerging threats and recommend preventive or detective control enhancements.
  • Demonstrate a strong understanding of Equity Group security controls, their configuration, and intended purpose.
  • Understand log correlation rules, thresholds, and workflows that drive SOC operations.
  • Recommend configuration changes to security controls and clearly articulate associated business risks and technical impacts.
  • Understand the architecture, data flows, and end-to-end incident management processes within Equity Group.
  • Demonstrate advanced knowledge of networking concepts, TCP/IP protocol internals (TTL, flags, fragmentation, RWIN), routing, and infrastructure protocols.
  • Interpret the impact of network access control lists (ACLs) on application protocols.
  • Understand modern distributed authentication systems (Kerberos, RADIUS, TACACS, X.509) and interpret authentication sessions.
  • Demonstrate working knowledge of Windows, Unix, and Linux operating systems.
  • Perform advanced packet capture and analysis using tools such as Wireshark, tcpdump, Snort, and Suricata.
  • Generate and interpret advanced port scans.
  • Maintain and secure server hosts and virtual machine images used for analysis and testing.
  • Locate and analyze system and application logs across major operating systems.
  • Demonstrate a strong understanding of computer security forensics and vulnerability analysis.
  • Explain the differences between risk, vulnerability, exploit, and exposure to technical and non-technical audiences.
  • Recognize modern exploit and payload delivery mechanisms including XSS, CSRF, and shellcode.
  • Demonstrate general scripting and data analysis skills.
  • Understand execution flow in modern programming and scripting languages.
  • Read and interpret scripts written by others.
  • Demonstrate understanding of advanced SQL queries.
  • Maintain and contribute to SOC technical documentation, procedures, and standards.
  • Produce situation analysis and post-incident reports to support continuous improvement.
  • Use Wiki platforms, HTML, diagrams, and flowcharts to clearly document processes and workflows.
  • Work closely with SOC Analysts (L1–L3), ICT teams, and other InfoSec sub-functions.
  • Participate actively in shift handovers, daily briefings, and incident reviews.
  • Contribute to inter-analyst training through documentation, knowledge sharing, and mentoring.
  • Maintain an Individual Development Plan (IDP) aligned to career progression within Equity Group.
  • Incident handling efficiency and quality, including resolution and escalation accuracy.
  • Adherence to SOC processes, SLAs, and escalation procedures.
  • Quality of analysis, documentation, and reporting.
  • Contribution to knowledge sharing, training, and continuous improvement.
  • Contribute meaningful shift handover notes with context and insights.
  • Participate in shift forums, team discussions, and SOC improvement initiatives.
  • Identify and report SIEM or tooling issues.
  • Proficient in SIEM, EDR, NDR, and SOAR platforms for alert triage and incident response.
  • Strong understanding of threat detection, log analysis, and MITRE ATT&CK techniques.
  • Experience with incident escalation, containment actions, and root-cause analysis.
  • Knowledge of security controls across network, endpoint, cloud, and identity environments.
  • Clear communication, effective handover, and collaboration within SOC and cross-functional teams
  • Experience with SIEM, SOAR, EDR, and forensic investigation tools in a production environment.
  • Demonstrated experience in incident response coordination, escalation, and reporting.
  • Experience in financial services or other regulated environments is an added advantage.
  • Professional certifications such as GCIA, GCIH, CEH, Security+, or equivalent are highly desirable.
  • Exposure to threat intelligence analysis, vulnerability management, and security control tuning.
  • Experience in scripting, network packet analysis, and forensic investigation.
  • Proven ability to document technical procedures and contribute to knowledge management.
  • Bachelor’s degree in information security, Computer Science, IT, or related discipline.
  • 3–5 years’ experience in a SOC, cyber defense, or security operations environment.
bachelor degree
12
JOB-6980789445bce

Vacancy title:
SOC Analyst (L2)

[Type: FULL_TIME, Industry: Banking, Category: Computer & IT, Protective Services]

Jobs at:
Equity Bank

Deadline of this Job:
Friday, February 13 2026

Duty Station:
Nairobi | Nairobi

Summary
Date Posted: Monday, February 2 2026, Base Salary: Not Disclosed

Similar Jobs in Kenya
Learn more about Equity Bank
Equity Bank jobs in Kenya

JOB DETAILS:

Role Purpose

The SOC Analyst Level 2 is responsible for advanced monitoring, analysis, investigation, and coordination of information security incidents across Equity Group. The role builds Level 1 SOC capabilities and focuses on incident management, technical analysis, escalation, forensic investigation, and collaboration with internal and external stakeholders to protect the confidentiality, integrity, and availability of Group information assets.

Key Responsibilities

  • Lead and manage security incident activities from identification through containment, eradication, and recovery.
  • Assess incidents against predefined criteria and determine when escalation to a Declared Security Incident is required.
  • Coordinate incident response activities including escalations, notifications, stakeholder communications, and incident bridges.
  • Communicate the impact and nature of security incidents in business and operational continuity terms.
  • Conduct advanced technical assessments of security incidents including malware analysis, packet-level analysis, and system-level forensic investigations.
  • Perform network traffic analysis to extract content and context from packet captures.
  • Reconstruct sessions, retrieve files from network captures, and support forensic investigations.
  • Interpret vulnerability reports and determine effective detection and mitigation approaches.
  • Assess severity levels of security threats (incidents, vulnerabilities, malicious code) and ensure timely notification and escalation.
  • Monitor, manage, and correlate information from public and private threat intelligence sources.
  • Identify emerging threats and recommend preventive or detective control enhancements.
  • Demonstrate a strong understanding of Equity Group security controls, their configuration, and intended purpose.
  • Understand log correlation rules, thresholds, and workflows that drive SOC operations.
  • Recommend configuration changes to security controls and clearly articulate associated business risks and technical impacts.
  • Understand the architecture, data flows, and end-to-end incident management processes within Equity Group.
  • Demonstrate advanced knowledge of networking concepts, TCP/IP protocol internals (TTL, flags, fragmentation, RWIN), routing, and infrastructure protocols.
  • Interpret the impact of network access control lists (ACLs) on application protocols.
  • Understand modern distributed authentication systems (Kerberos, RADIUS, TACACS, X.509) and interpret authentication sessions.
  • Demonstrate working knowledge of Windows, Unix, and Linux operating systems.
  • Perform advanced packet capture and analysis using tools such as Wireshark, tcpdump, Snort, and Suricata.
  • Generate and interpret advanced port scans.
  • Maintain and secure server hosts and virtual machine images used for analysis and testing.
  • Locate and analyze system and application logs across major operating systems.
  • Demonstrate a strong understanding of computer security forensics and vulnerability analysis.
  • Explain the differences between risk, vulnerability, exploit, and exposure to technical and non-technical audiences.
  • Recognize modern exploit and payload delivery mechanisms including XSS, CSRF, and shellcode.
  • Demonstrate general scripting and data analysis skills.
  • Understand execution flow in modern programming and scripting languages.
  • Read and interpret scripts written by others.
  • Demonstrate understanding of advanced SQL queries.
  • Maintain and contribute to SOC technical documentation, procedures, and standards.
  • Produce situation analysis and post-incident reports to support continuous improvement.
  • Use Wiki platforms, HTML, diagrams, and flowcharts to clearly document processes and workflows.
  • Work closely with SOC Analysts (L1–L3), ICT teams, and other InfoSec sub-functions.
  • Participate actively in shift handovers, daily briefings, and incident reviews.
  • Contribute to inter-analyst training through documentation, knowledge sharing, and mentoring.
  • Maintain an Individual Development Plan (IDP) aligned to career progression within Equity Group.
  • Incident handling efficiency and quality, including resolution and escalation accuracy.
  • Adherence to SOC processes, SLAs, and escalation procedures.
  • Quality of analysis, documentation, and reporting.
  • Contribution to knowledge sharing, training, and continuous improvement.
  • Contribute meaningful shift handover notes with context and insights.
  • Participate in shift forums, team discussions, and SOC improvement initiatives.
  • Identify and report SIEM or tooling issues.

Qualifications

Key Technical Skills and Competencies

  • Proficient in SIEM, EDR, NDR, and SOAR platforms for alert triage and incident response.
  • Strong understanding of threat detection, log analysis, and MITRE ATT&CK techniques.
  • Experience with incident escalation, containment actions, and root-cause analysis.
  • Knowledge of security controls across network, endpoint, cloud, and identity environments.
  • Clear communication, effective handover, and collaboration within SOC and cross-functional teams

Experience Requirements

  • Experience with SIEM, SOAR, EDR, and forensic investigation tools in a production environment.
  • Demonstrated experience in incident response coordination, escalation, and reporting.
  • Experience in financial services or other regulated environments is an added advantage.
  • Professional certifications such as GCIA, GCIH, CEH, Security+, or equivalent are highly desirable.
  • Exposure to threat intelligence analysis, vulnerability management, and security control tuning.
  • Experience in scripting, network packet analysis, and forensic investigation.
  • Proven ability to document technical procedures and contribute to knowledge management.

Academic Qualifications and Certifications

  • Bachelor’s degree in information security, Computer Science, IT, or related discipline.
  • 3–5 years’ experience in a SOC, cyber defense, or security operations environment.

Work Hours: 8

Experience in Months: 12

Level of Education: bachelor degree

Job application procedure

Application Link: Click Here to Apply Now

All Jobs | QUICK ALERT SUBSCRIPTION

Job Info
Job Category: Computer/ IT jobs in Kenya
Job Type: Full-time
Deadline of this Job: Friday, February 13 2026
Duty Station: Nairobi | Nairobi
Posted: 02-02-2026
No of Jobs: 1
Start Publishing: 02-02-2026
Stop Publishing (Put date of 2030): 10-10-2076
Apply Now
Notification Board

Join a Focused Community on job search to uncover both advertised and non-advertised jobs that you may not be aware of. A jobs WhatsApp Group Community can ensure that you know the opportunities happening around you and a jobs Facebook Group Community provides an opportunity to discuss with employers who need to fill urgent position. Click the links to join. You can view previously sent Email Alerts here incase you missed them and Subscribe so that you never miss out.

Caution: Never Pay Money in a Recruitment Process.

Some smart scams can trick you into paying for Psychometric Tests.