SOC Analyst - Level 3
Job Description
Key Responsibilities
Technical
Managerial
Personal Attributes
Our client, a pioneer in providing cybersecurity solutions in Ghana is looking for an SOC Analyst (Level 3). The ideal candidate will be responsible for Monitoring and Operator Services, Security Analysis and Incident Response, Threat Intelligent, Penetration testing, Vulnerability assessment.
Key Responsibilities
- Acts as the double-validation agent to ascertain the veracity of any security incidents that have been logged in the ticket/case management system.
- Participates in the investigation and validation of identified security incidents.
- Proactively hunts for threats by analyzing security logs to identify incidents
- Assists in the response and resolution of security incidents
- Creates and maintain several Incident Response documentations, including processes, and procedures to facilitate the resolution of cybersecurity incidents.
- Researches, builds and maintains an internal database on threat intelligence and vulnerabilities to aid in the analysis, resolution, remediation, and reference of security incidents
- Escalates security incidents to the SOC manager / HOD so a decision can be taken to alert clients or other relevant stakeholders
- Communicates technical issues to non-technical personnel
- Generates and compiles periodic and situational reports on security incidents for management, clients and other stakeholders.
- Trains Level 2 and Level 1 team members & Customers.
- Should be able to work in shifts
COMPETENCIES
Educational Qualifications and Experience- Degree in Computer Science, CompTIA Security+, CISM, CEH is required.
- CISSP is advantage.
- Minimum 3 years of work experience in: Network Defence, Incident Response, Computer Forensics, Vulnerability Assessment, Intrusion Prevention Penetration Testing
Technical
- Ability to analyze security events and alerts for incidents determination or suspicious activities (decision making).
- Ability to analyze the use of case monitoring.
- Decision-making for highly critical events.
- Ability to analyze availability and performance of the tools and security controls in a virtual infrastructure.
- Excellent working knowledge of basic database query scripting in relation to Penetration Testing
- Excellent working knowledge of networking, TCP/IP and common services (like HTTPS, SSH)
- Strong analytical and troubleshooting skills and a desire to tackle complex problems.
- Ability to produce good technical documents
- Ability to Produce templates for Vulnerability assessment & Pen testing
Managerial
- Ability to plan, coordinate and follow up on work activities
- Ability to work closely with people at all levels
- Ability to pay attention to details and execute an assignment in strict timelines
- Customer service-oriented and willing to work for long hours
Personal Attributes
- Communication- The ability to articulate oneself clearly in both written and verbal English.
- Must have a good attitude, bright and passionate about work
- Team player
- Self-motivated and organized
- Trustworthiness-ability to conduct self in a manner which elicits trust, respect and confidence of management and workers.
- A high degree of integrity, honesty, and reliability
Job Type
Full-Time Regular
Full-Time Regular