About the job Security Operations Centre (SOC) Analyst
EMPLOYMENT TYPE:
6-12 month contract with extension possibilities.
COMPANY:
An IT Solutions company based in Cape Town.
LOCATION:
Anywhere in South Africa for project in USA.
WORKING MODEL:
Remote
JOB OVERVIEW:
In this project, as SOC Analyst, you will play a key role in protecting client environments by proactively monitoring, investigating, and responding to security alerts and incidents.
DESCRIPTION OF POSITION:
You will monitor and analyse security events across multiple platforms, identifying potential threats and escalating where appropriate. Responsibilities include triaging alerts, assisting with incident containment and remediation, documenting case analyses, and contributing to the improvement of detection rules and response playbooks. The role also involves supporting compliance and audit requirements through accurate reporting.
This is ideal for a technically skilled professional with a passion for cybersecurity, looking to enhance their expertise in a fast-paced and collaborative environment.
KNOWLEDGE AND SKILLS:
- Strong analytical, investigative, and problem-solving abilities.
- Familiarity with SIEM platforms (e.g. Splunk, Sentinel) and Endpoint Detection and Response (EDR) tools.
- Understanding of threat intelligence tools and methodologies.
- Ability to determine the legitimacy, severity, and impact of security alerts.
- Excellent communication skills, capable of translating complex issues into clear, accessible language.
- Calm and composed when working under pressure.
- Proactive, collaborative, and aligned with a culture of service and continuous improvement.
QUALIFICATIONS REQUIRED:
- Degree in Computer Science, Cybersecurity, Information Technology, or a related discipline; or equivalent practical experience.
EXPERIENCE REQUIRED:
- At least 5 years of experience working in a Security Operations Centre (SOC) or cybersecurity environment.
- Practical experience in monitoring, triaging, and investigating alerts using SIEM, EDR, and related security tools.
- Hands-on involvement in incident response processes, including escalation, containment, and remediation.
ADVANTAGEOUS SKILLS:
- Experience in threat hunting, malware analysis, or advanced incident response.
- Familiarity with developing or enhancing incident response playbooks and detection rules.
- Exposure to compliance-focused environments (e.g. PCI-DSS, HIPAA, ISO 27001).
- Potential to progress towards senior SOC roles such as Tier 2/3 Analyst, SOC Team Lead, Threat Hunting Specialist, or Incident Response Specialist.
- Professional certifications are advantageous, such as:
- CompTIA Security+
- Certified SOC Analyst (CSA)
- GIAC Certified Incident Handler (GCIH)
- SANS SEC450 or equivalent
**Please note: If you have not heard from us within 2 weeks, please consider your application unsuccessful.