715 Security Operations jobs in Kenya
Security Operations Center (SOC) Analyst
Posted 3 days ago
Job Viewed
Job Description
Senior Security Operations Center (SOC) Analyst
Posted 4 days ago
Job Viewed
Job Description
As a Senior SOC Analyst, you will be responsible for monitoring, detecting, analyzing, and responding to cybersecurity threats and incidents across the organization's network and systems. You will play a crucial role in safeguarding sensitive data and ensuring the integrity and availability of our IT infrastructure. This position requires a deep understanding of threat landscapes, security tools, and incident response procedures.
Key Responsibilities:
- Monitor security alerts and events from various sources, including SIEM, IDS/IPS, firewalls, and endpoint detection systems.
- Perform in-depth analysis of security incidents, including log analysis, malware analysis, and forensic investigations.
- Develop and refine threat detection rules, correlation logic, and alerting mechanisms.
- Lead and coordinate incident response activities, including containment, eradication, and recovery efforts.
- Conduct vulnerability assessments and penetration testing to identify and mitigate security weaknesses.
- Stay current with emerging threats, vulnerabilities, and attack vectors relevant to the financial sector.
- Develop and maintain comprehensive documentation, including incident response plans, playbooks, and SOPs.
- Provide technical guidance and mentorship to junior SOC analysts.
- Collaborate with IT, engineering, and business units to implement security best practices.
- Participate in security awareness training and contribute to a security-conscious culture.
- Conduct threat hunting exercises to proactively identify potential threats.
- Evaluate and recommend new security technologies and tools.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 5 years of experience in a SOC analyst or similar cybersecurity role.
- Proven experience with Security Information and Event Management (SIEM) tools (e.g., Splunk, QRadar, ArcSight).
- Strong understanding of networking protocols, operating systems (Windows, Linux), and common attack vectors.
- Hands-on experience with Intrusion Detection/Prevention Systems (IDS/IPS), firewalls, and endpoint security solutions.
- Knowledge of incident response methodologies and frameworks (e.g., NIST, SANS).
- Relevant certifications such as CISSP, CEH, GIAC, or Security+ are highly desirable.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong communication skills, both written and verbal, for clear reporting and collaboration in a remote setting.
- Ability to work independently and as part of a distributed team.
Senior Security Operations Engineer
Posted 2 days ago
Job Viewed
Job Description
Key Responsibilities:
- Design, deploy, and manage security tools and technologies, including SIEM, EDR, IDS/IPS, SOAR, and threat intelligence platforms.
- Develop and automate security workflows and incident response playbooks to enhance efficiency and effectiveness.
- Monitor the health and performance of security infrastructure, ensuring optimal operation and availability.
- Analyze security data to identify patterns, anomalies, and potential threats, and develop detection rules accordingly.
- Collaborate with incident response teams to provide technical expertise during security investigations.
- Conduct threat hunting exercises to proactively identify sophisticated threats that may evade automated detection.
- Evaluate and recommend new security technologies and solutions to address emerging threats.
- Ensure that security systems are configured and maintained in accordance with best practices and organizational policies.
- Develop and maintain comprehensive documentation for security systems and processes.
- Mentor junior engineers and analysts, providing guidance on security operations and tool management.
Qualifications:
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Minimum of 7 years of experience in security operations, engineering, or a related cybersecurity role.
- Proven expertise in managing and optimizing SIEM solutions (e.g., Splunk, QRadar, LogRhythm) and EDR platforms.
- Strong understanding of network protocols, operating systems (Windows, Linux), and cloud environments (AWS, Azure, GCP).
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation and tool integration.
- Experience with incident response methodologies and security frameworks.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong communication and interpersonal skills, with the ability to work effectively in a team environment.
- Relevant certifications such as CISSP, GIAC, CCSP are highly desirable.
- Ability to balance remote work with periodic on-site meetings and collaboration.
Join our client and play a pivotal role in safeguarding their digital landscape through advanced security engineering, with the flexibility of a hybrid work arrangement.
Information Security Operations Manager
Posted 3 days ago
Job Viewed
Job Description
Senior Security Analyst - Threat Intelligence
Posted 3 days ago
Job Viewed
Job Description
Information Security Analyst - Threat Intelligence
Posted 6 days ago
Job Viewed
Job Description
Cybersecurity Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities:
- Collect, analyze, and interpret threat intelligence data from diverse sources (OSINT, commercial feeds, internal telemetry).
- Identify and track advanced persistent threats (APTs), malware, and other cyber adversaries.
- Develop and maintain threat intelligence reports, summaries, and briefings for various audiences.
- Map observed threats to the MITRE ATT&CK framework and other relevant models.
- Provide proactive recommendations for threat mitigation and security control improvements.
- Support incident response efforts by providing timely and relevant threat context.
- Develop and refine threat hunting hypotheses based on intelligence.
- Automate intelligence collection and analysis processes where possible.
- Collaborate with internal security teams (SOC, IR, vulnerability management) to enhance defensive capabilities.
- Stay informed about geopolitical events and their potential impact on the threat landscape.
- Contribute to the development and improvement of threat intelligence platforms and tools.
The ideal candidate will possess a Bachelor's degree in Computer Science, Cybersecurity, or a related field, or equivalent practical experience. A minimum of 3 years of experience in cybersecurity, with a focus on threat intelligence, security operations, or incident response, is required. Demonstrable experience with threat intelligence platforms, SIEM tools, and analysis techniques is essential. Strong knowledge of malware analysis, network protocols, and attacker TTPs is a must. Excellent research, analytical, and communication skills are paramount. Certifications such as GIAC Certified Cyber Threat Professional (GCTP), EC-Council Certified Threat Intelligence Analyst (CTIA), or equivalent are highly desirable. The ability to work independently and as part of a remote global team is critical.
Be The First To Know
About the latest Security operations Jobs in Kenya !
Cybersecurity Threat Intelligence Analyst
Posted 3 days ago
Job Viewed
Job Description
Senior Threat Intelligence Analyst
Posted 4 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor, analyze, and report on global cyber threats and trends.
- Identify and track threat actors, their motivations, and their TTPs.
- Conduct in-depth research on emerging malware, vulnerabilities, and attack vectors.
- Develop and disseminate actionable threat intelligence reports and alerts.
- Collaborate with security operations and incident response teams to operationalize intelligence.
- Utilize various intelligence sources and tools, including OSINT and commercial feeds.
- Provide strategic recommendations for improving the organization's security posture.
- Contribute to the development of threat hunting methodologies.
- Present intelligence findings to technical and non-technical audiences.
- Stay abreast of the latest advancements in cybersecurity and threat intelligence.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 5 years of experience in threat intelligence, cybersecurity analysis, or incident response.
- Deep understanding of threat actor TTPs, malware analysis, and network security.
- Proficiency with threat intelligence platforms and analytical tools.
- Strong experience with OSINT techniques and data correlation.
- Excellent research, analytical, and critical-thinking skills.
- Strong written and verbal communication skills for report writing and presentations.
- Ability to work independently and manage time effectively in a remote setting.
- Relevant certifications such as GIAC Certified Threat Intelligence (GCTI) or similar are highly desirable.
- Experience in threat hunting is a plus.
Cyber Threat Intelligence Analyst
Posted 4 days ago
Job Viewed
Job Description
Key responsibilities include monitoring open-source intelligence (OSINT), dark web forums, and commercial threat feeds for relevant information. You will develop and maintain threat actor profiles, mapping their activities to specific campaigns and industries. This role involves correlating and analyzing security alerts, logs, and other data to detect sophisticated threats and advanced persistent threats (APTs). You will produce regular threat landscape reports, briefings, and actionable intelligence for security operations centers (SOCs) and relevant stakeholders. The ideal candidate will have a strong understanding of cyber threat actors, attack vectors, and defensive security measures. Proficiency in using threat intelligence platforms, SIEM tools, and data analysis techniques is essential. Experience with reverse engineering malware or digital forensics is a plus. Excellent written and verbal communication skills are required to effectively convey complex technical information. You will work collaboratively with incident response, security operations, and engineering teams to operationalize threat intelligence. This is an opportunity to make a significant contribution to cybersecurity in a dynamic, remote work environment, staying at the forefront of the evolving threat landscape.