Advanced Threat Detection: Identify and analyse sophisticated threats and vulnerabilities using advanced tools and techniques.
Incident Response Leadership: Lead and coordinate response efforts for major security incidents.
Forensic Analysis: Conduct deep-dive forensic analysis to understand the root cause and impact of security breaches.
Threat Hunting: Proactively search for hidden threats and indicators of compromise (IOCs) within the network.
Mentorship: Provide guidance and mentorship to junior SOC analysts (Level 1 and Level 2).
Third Level Support: Serve as level 3 support engineer on infrastructure support, project and security events.
Reporting and Documentation: Prepare detailed reports on security incidents and threat intelligence findings.
Ticket Resolution Time: Measure the average time taken to resolve high-complexity tickets and diverse range of complex problems related to network security.
Policy Compliance Rate: Evaluate the adherence to security policies and best practices by measuring the level of compliance within the network infrastructure.
Educational Background: A degree in Computer Science, Information Technology, Cybersecurity, or a related field.
Certifications: N+ CompTIA Security+, Cisco CCNP, CEH, CISSP, CCTA, CISM Certified Incident Handler (GCIH) (advantageous).
5+ years of experience in cybersecurity, particularly within a SOC environment.
Prior working experience in IT at a senior level is beneficial, highly experienced in the following endpoint Detection and Response (EDR) Tools: Microsoft Defender for Endpoint, Checkpoint Endpoint security and Microsoft Sentinel.
One year contract, renewable.
Send CV to :