426 Senior Remote Information Security Analyst jobs in Kenya
Senior Information Security Threat Analyst (Remote)
Posted 4 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and events from various sources (SIEM, IDS/IPS, EDR) to detect and identify potential cyber threats.
- Conduct in-depth investigations into security incidents, including malware analysis, forensic examination, and root cause determination.
- Perform threat hunting activities to proactively identify hidden threats within the network environment.
- Analyze threat intelligence from various feeds and sources to understand emerging threats and attacker tactics, techniques, and procedures (TTPs).
- Develop and implement detection rules and signatures to enhance security monitoring capabilities.
- Create comprehensive reports on security incidents, threat analyses, and recommendations for mitigation.
- Collaborate with incident response teams to contain, eradicate, and recover from security breaches.
- Stay current with the latest cybersecurity threats, vulnerabilities, and defensive technologies.
- Develop and maintain security documentation, playbooks, and procedures.
- Provide expert guidance and support to junior security analysts and other team members.
- Contribute to the continuous improvement of the SOC's tools, processes, and capabilities.
- Participate in tabletop exercises and incident response drills.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 6 years of experience in information security, with a significant focus on threat analysis and incident response.
- Proven experience in analyzing malware, conducting forensic investigations, and understanding network protocols.
- Proficiency with security tools such as SIEM platforms (e.g., Splunk, QRadar), EDR solutions, and packet analysis tools (e.g., Wireshark).
- Strong understanding of common attack vectors, cyber threat landscapes, and threat actor TTPs.
- Experience with threat intelligence platforms and methodologies.
- Excellent analytical, problem-solving, and critical thinking skills.
- Exceptional written and verbal communication skills, with the ability to articulate technical findings clearly.
- Demonstrated ability to work independently and effectively in a remote, potentially 24/7 operational environment.
- Relevant certifications such as GIAC GCIH, GCFA, CEH, or CISSP are highly desirable.
Cybersecurity Threat Analyst
Posted 20 days ago
Job Viewed
Job Description
Lead Cybersecurity Threat Analyst
Posted 20 days ago
Job Viewed
Job Description
Principal Cybersecurity Threat Analyst
Posted 3 days ago
Job Viewed
Job Description
Senior Cybersecurity Threat Analyst
Posted 20 days ago
Job Viewed
Job Description
Remote Cybersecurity Threat Analyst
Posted 20 days ago
Job Viewed
Job Description
Key responsibilities include:
- Monitoring security information and event management (SIEM) systems for potential security incidents.
- Analyzing security alerts and logs to identify and investigate malicious activities, such as malware infections, unauthorized access, and phishing attempts.
- Conducting in-depth forensic analysis of security breaches to determine the root cause and impact.
- Developing and refining threat intelligence feeds and signatures to enhance detection capabilities.
- Assisting in the development and implementation of incident response plans and playbooks.
- Providing real-time analysis and recommendations during active security incidents.
- Collaborating with other IT and security teams to implement protective measures and remediate vulnerabilities.
- Staying current with the latest cybersecurity threats, vulnerabilities, and defense techniques.
- Participating in security awareness training initiatives for employees.
- Generating regular reports on threat trends, incident summaries, and security posture.
The ideal candidate will hold a Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. Relevant industry certifications such as CompTIA Security+, CEH, or GSEC are highly desirable. A minimum of 4 years of experience in cybersecurity, with a focus on threat analysis, incident response, or security operations, is required. Strong knowledge of networking protocols, operating systems (Windows, Linux), and common attack vectors is essential. Proficiency with SIEM tools (e.g., Splunk, QRadar), EDR solutions, and threat intelligence platforms is crucial. Excellent analytical, problem-solving, and critical thinking skills are paramount. Exceptional communication and collaboration skills, with the ability to articulate technical information clearly, are necessary. This fully remote role offers a challenging and rewarding opportunity to safeguard our client's information systems against evolving cyber threats.
Remote Information Security Analyst - Threat Detection Specialist
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and logs from various sources (SIEM, IDS/IPS, firewalls, endpoints) to detect potential security incidents.
- Analyze security events and incidents to determine scope, impact, and root cause.
- Investigate and respond to security breaches and cyber threats in a timely and effective manner.
- Develop and refine threat detection rules, signatures, and use cases.
- Conduct vulnerability assessments and penetration testing (or coordinate with external teams).
- Implement and manage security tools and technologies.
- Contribute to the development and maintenance of incident response plans and playbooks.
- Perform forensic analysis of compromised systems when necessary.
- Stay abreast of the latest cybersecurity threats, vulnerabilities, and attack vectors.
- Educate internal teams on security best practices and awareness.
- Prepare detailed reports on security incidents and mitigation strategies.
- Ensure compliance with relevant security standards and regulations.
- Collaborate with IT and other departments to implement security controls.
This is a fully remote position, offering the flexibility to work from your preferred location. Our client is committed to a secure and productive remote work environment, utilizing cutting-edge tools to ensure data protection and operational efficiency. While the role is remote, it is conceptually linked to our client's security operations center near **Mlolongo, Machakos, Kenya**, providing an opportunity to play a vital role in global cybersecurity. We seek proactive and analytical individuals dedicated to safeguarding digital infrastructure.
Be The First To Know
About the latest Senior remote information security analyst Jobs in Kenya !
Job Description
Responsibilities:
- Monitor and analyze security alerts from various sources (SIEM, IDS/IPS, endpoint detection).
- Investigate and respond to cybersecurity incidents, performing root cause analysis and containment.
- Conduct threat hunting activities to proactively identify potential threats that may have bypassed existing security controls.
- Gather, analyze, and disseminate threat intelligence from internal and external sources.
- Develop and maintain threat models based on current and emerging threat landscapes.
- Create detection rules and signatures to identify malicious activity.
- Provide technical expertise and guidance on threat mitigation strategies to IT and security teams.
- Document incident findings, analysis, and recommendations clearly and concisely.
- Stay current with the latest cybersecurity threats, vulnerabilities, and attack vectors.
- Participate in tabletop exercises and incident response drills.
- Assist in the development and improvement of incident response playbooks.
- Collaborate with other security analysts and engineers on defense-in-depth strategies.
- Present threat intelligence briefings to management and relevant stakeholders.
- Contribute to the continuous improvement of security monitoring and incident response capabilities.
- Ensure compliance with relevant security policies and regulatory requirements.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 6 years of experience in cybersecurity, with a focus on threat analysis, incident response, or threat intelligence.
- Strong understanding of attacker methodologies (e.g., MITRE ATT&CK framework).
- Experience with SIEM tools (e.g., Splunk, ELK Stack), EDR solutions, and network forensics.
- Proficiency in malware analysis techniques and tools.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills.
- Ability to work under pressure and make sound decisions during security incidents.
- Relevant certifications such as GIAC Certified Incident Handler (GCIH), Certified Threat Intelligence Analyst (CTIA), or similar are a plus.
- Experience with scripting languages (e.g., Python) for automation is beneficial.
Cybersecurity Threat Analyst (Remote)
Posted 20 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze security alerts from various sources, including SIEM, IDS/IPS, and endpoint detection tools.
- Investigate and triage potential security incidents, performing in-depth forensic analysis when necessary.
- Identify emerging cybersecurity threats, vulnerabilities, and attack trends relevant to the organization.
- Develop and implement proactive threat hunting methodologies.
- Create and maintain documentation for security policies, procedures, and incident response plans.
- Collaborate with IT and security teams to implement and enhance security controls.
- Provide timely and accurate reporting on security incidents and threat intelligence to management.
- Stay up-to-date with the latest cybersecurity technologies, best practices, and industry regulations.
- Participate in security awareness training initiatives for employees.
- Contribute to the continuous improvement of the security operations center's capabilities.
This remote opportunity is perfect for a cybersecurity professional who is passionate about protecting systems and data from malicious actors. The ability to work independently, manage critical situations calmly, and communicate complex technical information clearly is paramount. If you possess strong investigative skills, a comprehensive knowledge of network security, and a drive to stay ahead of evolving cyber threats, we encourage you to apply and become an integral part of our client's robust security framework.
Lead Cybersecurity Threat Analyst (Remote)
Posted 9 days ago
Job Viewed
Job Description
Responsibilities:
- Lead the threat intelligence gathering, analysis, and dissemination process.
- Develop and implement advanced threat detection and hunting methodologies.
- Analyze and interpret security alerts, logs, and network traffic for suspicious activities.
- Conduct in-depth investigations of security incidents, including root cause analysis and impact assessment.
- Develop and refine incident response playbooks and procedures.
- Provide technical leadership and mentorship to a team of cybersecurity analysts.
- Collaborate with IT and security teams to implement security controls and remediation efforts.
- Stay current with the latest threat actors, attack vectors, vulnerabilities, and cybersecurity trends.
- Develop and maintain threat models and risk assessments for the organization.
- Author clear and concise reports on threat landscape, incident findings, and recommendations for management.
- Utilize SIEM, EDR, SOAR, and other security tools for effective monitoring and response.
- Represent the security team in cross-functional meetings and discussions.
- Contribute to the continuous improvement of security operations processes and technologies.
- Manage and prioritize multiple ongoing investigations and projects.
- Bachelor's or Master's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 7 years of experience in cybersecurity, with a significant focus on threat analysis, incident response, or security operations.
- Proven experience leading a security analysis team.
- In-depth knowledge of various attack vectors, TTPs (Tactics, Techniques, and Procedures), and threat intelligence frameworks (e.g., MITRE ATT&CK).
- Expertise in utilizing SIEM platforms (e.g., Splunk, QRadar), EDR solutions, and network security monitoring tools.
- Experience with malware analysis (static and dynamic) and reverse engineering techniques is highly desirable.
- Strong understanding of networking protocols, operating systems (Windows, Linux), and cloud security concepts (AWS, Azure, GCP).
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to articulate technical concepts to diverse audiences.
- Ability to work independently, manage priorities effectively, and thrive in a fast-paced remote environment.
- Relevant certifications such as CISSP, GCTI, GCFA, CEH, or OSCP are a strong advantage.
- Must have a secure and reliable home office setup with high-speed internet.