Job Purpose
To coordinate and support data collection, aggregation, cleaning/filtering and data analysis to generate actionable reports and respond to cyber threats.
Key Duties and Responsibilities
Technical and Operational Responsibilities
• Perform monitoring of security logs and alerts from Security Information and Events Management (SIEM) tools and other security platforms to identify potential threats.
• Perform data filtering and processing security events data from SIEM to ensure accuracy and integrity.
• Write reports and documentations detailing periodical findings of cybersecurity incidents and trends and the actions taken to avert future cyber threats.
• Reviewing cyber incident reports and performing correlation between incidents to detect suspicious patterns and anomalies.
• Collaborate with other SOC teams to provide data-driven insights to improve efficiency.
• performing Open-Source Intelligence (OSINT) collection on cyber threat actors.
• Supporting and coordinating with other incident response teams in identifying cyber-attack vectors by analyzing raw data and identifying suspicious patterns.
• Endeavour to assist and improve automation of data collection, collation and analysis to enhance efficiency.
• Prepare graphical and appealing cyber security training/awareness material.
• Manage SIEM tools and other cybersecurity management tools to perform analysis and generate actionable insights.
Other Responsibilities
• Conduct threat research
• Any other duty assigned.
Qualifications
• Bachelor’s degree in Information Technology (IT), Data Science and Statistics, Cybersecurity, Computer Engineering, Telecommunications and Information Engineering & Computer Science and/or any relevant qualification.
• Professional certification(s) in SOC Analysis (CSA), Cybersecurity, Information Security and/or CompTIA Security + or other related certifications.
• Knowledge of programming languages (Python, R), scripting/automation (Bash, PowerShell) and database query languages (SQL).
• Familiar with SIEM tools (Splunk, SolarWinds etc).
• Strong proficiency and understanding of statistics and data analysis techniques using Ms Excel or Google Sheets.
• Active membership in at least one (1) professional body.
Work Experience
Three (3) years’ experience in a cybersecurity/SOC analysis environment.
Competencies
Technical Competencies
• Good understanding of cybersecurity concepts and protocols, cyber risk management, incident response and common cyber threats such as DoS attacks, phishing and malware.
• SOC and Data Analytical Skills to deal with large volumes of data to identify anomalies, trends and suspicious patterns.
• Knowledge in Open-Source Intelligence applications
• Attention to detail for accuracy in reporting
• Good communications skills to explain and document findings to SOC teams
• Team player in a fast-paced and dynamic work environment
• Good report writing and presentation skills.
• Have agility in learning new security analysis tools and technologies.
Behavioural/General Competencies
• Honesty and integrity
• Excellent problem-solving skills
• Organization skills
• Confidentiality
• Flexibility
• Interpersonal relations
Candidates are requested to note that:
- INCOMPLETE applications will not be considered.
- Only shortlisted candidates will be contacted.
Closing Date: Tuesday, 25 Feb 2025 at 5.00 p.m.