The SOC Analyst Level 3 is a senior cybersecurity professional responsible for leading advanced security investigations, threat hunting, incident response, and mentoring SOC Level 1 and Level 2 analysts. This role requires deep expertise in security operations, forensics, threat intelligence, and security tool optimization. The Level 3 analyst also collaborates with stakeholders to improve security posture and incident response processes.
This position involves working within a Managed Security Services Provider (MSSP) environment, managing security operations for multiple clients across various industries. You will ensure compliance with Service Level Agreements (SLAs), develop security strategies, and provide expert-level incident handling and response.
Key Responsibilities:
Incident Handling & Response:
Lead complex security investigations and incident response activities.
Perform deep-dive forensic analysis, malware analysis, and reverse engineering of security incidents.
Manage and coordinate incident containment, eradication, and recovery efforts. Conduct root cause analysis and post-incident reviews to improve defenses.
Threat Hunting & Intelligence:
Conduct proactive threat hunting activities using SIEM, EDR, and other security tools.
Develop and test hypotheses for threat scenarios based on the latest cyber threat intelligence.
Utilize threat intelligence feeds to enhance detection capabilities and improve SOC workflows.
Security Tool Optimization & Automation:
Fine-tune and configure SOC tools, including SIEM, EDR, IDS/IPS, SOAR, and firewalls for optimal performance.
Develop and automate security processes using scripting (e.g., Python, PowerShell, Bash) and SOAR platforms.
Identify gaps in security monitoring and implement improvements to enhance detection and response capabilities.
Collaboration & Escalation:
Act as the escalation point for complex security incidents that Level 1 and Level 2 analysts cannot resolve.
Collaborate with security architects, network engineers, and IT teams to enhance security controls.
Work closely with threat intelligence teams to analyze and respond to emerging threats.
Reporting & Documentation:
Maintain detailed documentation of security incidents, forensic findings, and response actions.
Generate executive reports and present security insights to management and stakeholders.
Improve and develop SOC playbooks, workflows, and best practices.
Security Improvement Initiatives:
Participate in red team/blue team exercises to enhance security preparedness.
Conduct training sessions and mentorship programs for Level 1 and Level 2 analysts.
Drive continuous improvement of SOC processes, policies, and incident response methodologies.
SOC Operations & Shift Management:
Provide leadership and direction during security incidents and crisis situations.
Participate in SOC shift rotations, including nights, weekends, and holidays.
Ensure timely response to security incidents while maintaining high-quality incident resolution.
People Skills:
Strong leadership skills with experience mentoring and training junior analysts.
Excellent problem-solving and decision-making abilities in high-pressure situations.
Ability to communicate complex security concepts to both technical and non technical audiences.
Collaborative mindset, working effectively across teams and departments.
Strong analytical, research, and documentation skills.
Qualifications:
Bachelor’s degree in Cybersecurity, Information Technology, or a related field (or equivalent experience).
4+ years of experience in security operations, incident response, and cybersecurity analysis.
Strong understanding of cybersecurity frameworks (MITRE ATT&CK, NIST, ISO 27001).
Hands-on experience with SIEM, EDR, IDS/IPS, and other security tools.
Proficiency in scripting languages (Python, PowerShell, Bash) for automation and tool integration.
Deep knowledge of network security, threat intelligence, digital forensics, and malware analysis.
Tagged as: ICT Jobs
For appointment to the position of Part-Time Lecturer, an applicant must have: An earned PhD or a Master’s degree...
Apply For This JobKey Responsibilities Economic analysis and writing of timely and relevant policy briefs Econometric analysis of economic data sets Macroeconomic and...
Apply For This JobResponsibilities: Product Vision & Definition Define the long-term product vision for GiveDirectly’s cash delivery platform, cutting away historical...
Apply For This JobBrief Description Data Governance Manager reporting to the Senior Manager – Data Engineering & Governance the position holder...
Apply For This JobThe Monitoring and Evaluation (M&E) Officer is a key technical position within the USAID Nawiri program, responsible for supporting the...
Apply For This JobThe data engineer manager will oversee the expansion and optimization of our data architecture and data pipeline with the purpose...
Apply For This Job