About the job Security Intelligence & Analyst – SOC L3
The Role
The SOC L3 – Security Intelligence & Analytics role is a senior cybersecurity position within the 5G Intelligence and Analytics function. The role is accountable for advanced threat detection, investigation, and response across 4G/5G RAN and Core environments, including development of 5G-specific security use cases, playbooks, and continuous improvement of the SOC security posture.
Duties & Responsibilities
-
Design and deploy 5G security use cases across SOC platforms for RAN and Core networks
-
Analyze 5G protocols, traffic flows, and architectures to identify advanced threats
-
Develop and maintain incident response playbooks and SOPs
-
Lead root cause analysis and advanced investigations for high-severity incidents
-
Contain, remediate, and mitigate security incidents with minimal business impact
-
Leverage SIEM, SOAR, IDS/IPS tools to analyze and neutralize threats
-
Operationalize threat intelligence to strengthen proactive detection capabilities
-
Collaborate with cross-functional teams to implement preventive security controls
-
Define and present KPIs, KRIs, and SOC performance metrics
-
Mentor SOC analysts and contribute to capability uplift and knowledge sharing
Requirements
-
Bachelors or Masters degree in Cybersecurity, IT, or related field
-
Minimum 5 years experience in a SOC environment
-
Strong expertise in 4G/5G security operations and telecom networks
-
Hands-on experience with Splunk, Microsoft Sentinel, SIEM, SOAR, IDS/IPS
-
Proven experience managing high-severity incidents across IT and OT environments
-
Strong analytical, documentation, and stakeholder communication skills
-
ISP/telecom experience is a strong advantage
-
Certifications preferred: CISSP, GCIH, GCIA, Elastic Certified Analyst, BTL1, MITRE ATT&CK Defender, CCNA/CCNP CyberOps