426 Remote Information Security Analyst Threat Detection jobs in Kenya
Remote Information Security Analyst - Threat Detection Specialist
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and logs from various sources (SIEM, IDS/IPS, firewalls, endpoints) to detect potential security incidents.
- Analyze security events and incidents to determine scope, impact, and root cause.
- Investigate and respond to security breaches and cyber threats in a timely and effective manner.
- Develop and refine threat detection rules, signatures, and use cases.
- Conduct vulnerability assessments and penetration testing (or coordinate with external teams).
- Implement and manage security tools and technologies.
- Contribute to the development and maintenance of incident response plans and playbooks.
- Perform forensic analysis of compromised systems when necessary.
- Stay abreast of the latest cybersecurity threats, vulnerabilities, and attack vectors.
- Educate internal teams on security best practices and awareness.
- Prepare detailed reports on security incidents and mitigation strategies.
- Ensure compliance with relevant security standards and regulations.
- Collaborate with IT and other departments to implement security controls.
This is a fully remote position, offering the flexibility to work from your preferred location. Our client is committed to a secure and productive remote work environment, utilizing cutting-edge tools to ensure data protection and operational efficiency. While the role is remote, it is conceptually linked to our client's security operations center near **Mlolongo, Machakos, Kenya**, providing an opportunity to play a vital role in global cybersecurity. We seek proactive and analytical individuals dedicated to safeguarding digital infrastructure.
Remote Information Security Analyst - Threat Detection
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and events from various sources, including SIEM systems, IDS/IPS, firewalls, and endpoint detection tools.
- Analyze security incidents to determine their scope, impact, and root cause, employing advanced threat detection and analysis techniques.
- Respond to security breaches and cyber-attacks by initiating incident response protocols, coordinating containment efforts, and leading recovery operations.
- Conduct vulnerability assessments and penetration testing to identify weaknesses in systems and applications.
- Develop and maintain security policies, procedures, and best practices to safeguard company assets.
- Implement and manage security controls, including access management, data encryption, and network security measures.
- Stay informed about emerging threats, vulnerabilities, and cybersecurity trends, providing proactive recommendations for security enhancements.
- Collaborate with IT teams to implement security patches, updates, and configuration changes.
- Conduct security awareness training for employees to promote a security-conscious culture.
- Document security incidents, investigations, and resolution steps for audit and compliance purposes.
- Participate in security audits and ensure compliance with relevant industry regulations and standards.
- Develop and refine incident response plans and playbooks.
- Assist in the evaluation and implementation of new security technologies and solutions.
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Relevant certifications such as CISSP, Security+, CEH, or GIAC are highly desirable.
- Minimum of 4-6 years of experience in information security, with a focus on threat detection, incident response, and vulnerability management.
- Proven experience with SIEM tools (e.g., Splunk, LogRhythm), IDS/IPS, firewalls, and endpoint security solutions.
- In-depth knowledge of common attack vectors, malware, and intrusion techniques.
- Strong understanding of network protocols, operating systems (Windows, Linux), and cloud security principles (AWS, Azure, GCP).
- Excellent analytical and problem-solving skills, with the ability to think critically under pressure.
- Strong written and verbal communication skills, capable of explaining complex technical issues to both technical and non-technical audiences.
- Demonstrated ability to work independently, prioritize tasks, and manage time effectively in a remote setting.
- Experience with scripting languages (e.g., Python, PowerShell) for automation is a plus.
- Familiarity with regulatory compliance frameworks (e.g., GDPR, ISO 27001) is beneficial.
Remote Information Security Analyst - Threat Detection & Incident Response
Posted today
Job Viewed
Job Description
Responsibilities:
- Monitor security information and event management (SIEM) systems for suspicious activities and potential threats.
- Analyze security alerts, logs, and network traffic to identify and validate security incidents.
- Conduct thorough investigations of security breaches and provide detailed incident response reports.
- Develop and implement incident response plans and procedures.
- Perform vulnerability assessments and penetration testing to identify security weaknesses.
- Recommend and implement security controls and configurations to mitigate identified risks.
- Stay updated on the latest cybersecurity threats, vulnerabilities, and attack vectors.
- Collaborate with IT and other teams to implement security best practices across the organization.
- Develop and maintain security documentation, policies, and procedures.
- Conduct security awareness training for employees.
- Assist in the management of security tools and technologies.
- Participate in security audits and compliance efforts.
- Continuously evaluate and improve the effectiveness of security monitoring and response capabilities.
- Provide expertise on security matters to stakeholders across the organization.
- Contribute to the development of threat intelligence capabilities.
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Minimum of 3-5 years of experience in information security, with a focus on threat detection and incident response.
- Strong understanding of networking protocols, operating systems, and cybersecurity principles.
- Experience with SIEM tools (e.g., Splunk, QRadar, ELK Stack) and security technologies (e.g., firewalls, IDS/IPS, EDR).
- Proficiency in analyzing security logs and network traffic.
- Knowledge of incident response frameworks (e.g., NIST, SANS).
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong communication and reporting skills, with the ability to explain technical concepts to non-technical audiences.
- Relevant security certifications such as Security+, CEH, CISSP are highly desirable.
- Ability to work independently and manage time effectively in a remote environment.
- This role is based in Mombasa, Mombasa, KE but is performed entirely remotely.
Senior Information Security Threat Analyst (Remote)
Posted 4 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and events from various sources (SIEM, IDS/IPS, EDR) to detect and identify potential cyber threats.
- Conduct in-depth investigations into security incidents, including malware analysis, forensic examination, and root cause determination.
- Perform threat hunting activities to proactively identify hidden threats within the network environment.
- Analyze threat intelligence from various feeds and sources to understand emerging threats and attacker tactics, techniques, and procedures (TTPs).
- Develop and implement detection rules and signatures to enhance security monitoring capabilities.
- Create comprehensive reports on security incidents, threat analyses, and recommendations for mitigation.
- Collaborate with incident response teams to contain, eradicate, and recover from security breaches.
- Stay current with the latest cybersecurity threats, vulnerabilities, and defensive technologies.
- Develop and maintain security documentation, playbooks, and procedures.
- Provide expert guidance and support to junior security analysts and other team members.
- Contribute to the continuous improvement of the SOC's tools, processes, and capabilities.
- Participate in tabletop exercises and incident response drills.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 6 years of experience in information security, with a significant focus on threat analysis and incident response.
- Proven experience in analyzing malware, conducting forensic investigations, and understanding network protocols.
- Proficiency with security tools such as SIEM platforms (e.g., Splunk, QRadar), EDR solutions, and packet analysis tools (e.g., Wireshark).
- Strong understanding of common attack vectors, cyber threat landscapes, and threat actor TTPs.
- Experience with threat intelligence platforms and methodologies.
- Excellent analytical, problem-solving, and critical thinking skills.
- Exceptional written and verbal communication skills, with the ability to articulate technical findings clearly.
- Demonstrated ability to work independently and effectively in a remote, potentially 24/7 operational environment.
- Relevant certifications such as GIAC GCIH, GCFA, CEH, or CISSP are highly desirable.
Cybersecurity Threat Analyst
Posted 20 days ago
Job Viewed
Job Description
Lead Cybersecurity Threat Analyst
Posted 20 days ago
Job Viewed
Job Description
Principal Cybersecurity Threat Analyst
Posted 3 days ago
Job Viewed
Job Description
Be The First To Know
About the latest Remote information security analyst threat detection Jobs in Kenya !
Senior Cybersecurity Threat Analyst
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and logs from various sources (SIEM, IDS/IPS, EDR) to identify potential security incidents.
- Perform in-depth analysis of security threats, vulnerabilities, and attack patterns.
- Develop and implement new threat detection rules and signatures.
- Conduct threat hunting activities to proactively uncover hidden threats within the network.
- Analyze malware samples and provide insights into their functionality and impact.
- Investigate security incidents, conduct root cause analysis, and recommend remediation actions.
- Stay updated on the latest cybersecurity threats, trends, and technologies.
- Create comprehensive reports on security incidents, threat intelligence, and recommended mitigation strategies.
- Collaborate with incident response teams to contain and eradicate threats.
- Mentor junior analysts and contribute to the continuous improvement of security operations.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 6 years of experience in cybersecurity, with a strong focus on threat analysis, incident response, or SOC operations.
- Demonstrated expertise in analyzing various types of cyber threats (e.g., malware, phishing, APTs, DDoS).
- Proficiency with SIEM tools (e.g., Splunk, QRadar), EDR solutions, and network security monitoring tools.
- Strong understanding of networking protocols, operating systems (Windows, Linux), and cloud security principles.
- Experience with scripting languages (e.g., Python, PowerShell) for automation is highly desirable.
- Relevant certifications such as CISSP, SANS GIAC, OSCP are a plus.
- Excellent analytical and problem-solving skills, with meticulous attention to detail.
- Strong communication and collaboration skills, capable of working effectively in a remote team environment.
Remote Cybersecurity Threat Analyst
Posted 18 days ago
Job Viewed
Job Description
Job Description
Responsibilities:
- Monitor and analyze security alerts from various sources (SIEM, IDS/IPS, endpoint detection).
- Investigate and respond to cybersecurity incidents, performing root cause analysis and containment.
- Conduct threat hunting activities to proactively identify potential threats that may have bypassed existing security controls.
- Gather, analyze, and disseminate threat intelligence from internal and external sources.
- Develop and maintain threat models based on current and emerging threat landscapes.
- Create detection rules and signatures to identify malicious activity.
- Provide technical expertise and guidance on threat mitigation strategies to IT and security teams.
- Document incident findings, analysis, and recommendations clearly and concisely.
- Stay current with the latest cybersecurity threats, vulnerabilities, and attack vectors.
- Participate in tabletop exercises and incident response drills.
- Assist in the development and improvement of incident response playbooks.
- Collaborate with other security analysts and engineers on defense-in-depth strategies.
- Present threat intelligence briefings to management and relevant stakeholders.
- Contribute to the continuous improvement of security monitoring and incident response capabilities.
- Ensure compliance with relevant security policies and regulatory requirements.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 6 years of experience in cybersecurity, with a focus on threat analysis, incident response, or threat intelligence.
- Strong understanding of attacker methodologies (e.g., MITRE ATT&CK framework).
- Experience with SIEM tools (e.g., Splunk, ELK Stack), EDR solutions, and network forensics.
- Proficiency in malware analysis techniques and tools.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills.
- Ability to work under pressure and make sound decisions during security incidents.
- Relevant certifications such as GIAC Certified Incident Handler (GCIH), Certified Threat Intelligence Analyst (CTIA), or similar are a plus.
- Experience with scripting languages (e.g., Python) for automation is beneficial.