Jobs Career Advice Post Job
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Jun 11, 2025
    Deadline: Not specified
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Silensec is an Information Security Management Consulting and Training company. Silensec was initially created to utilise the skills of renowned professionals in Information Security, as a direct response to what we felt was a lack of practical training in the industry. Today, we collaborate with hundreds of clients worldwide to deliver a wide range of Infor...
    Read more about this company

     

    SOC Analyst Level 3

    The SOC Analyst Level 3 is a senior cybersecurity professional responsible for leading advanced security investigations, threat hunting, incident response, and mentoring SOC Level 1 and Level 2 analysts. This role requires deep expertise in security operations, forensics, threat intelligence, and security tool optimization. The Level 3 analyst also collaborates with stakeholders to improve security posture and incident response processes.

    This position involves working within a Managed Security Services Provider (MSSP) environment, managing security operations for multiple clients across various industries. You will ensure compliance with Service Level Agreements (SLAs), develop security strategies, and provide expert-level incident handling and response.

    Key Responsibilities:

    Incident Handling & Response:

    • Lead complex security investigations and incident response activities.
    • Perform deep-dive forensic analysis, malware analysis, and reverse engineering of security incidents.
    • Manage and coordinate incident containment, eradication, and recovery efforts. Conduct root cause analysis and post-incident reviews to improve defenses.

    Threat Hunting & Intelligence:

    • Conduct proactive threat hunting activities using SIEM, EDR, and other security tools.
    • Develop and test hypotheses for threat scenarios based on the latest cyber threat intelligence.
    • Utilize threat intelligence feeds to enhance detection capabilities and improve SOC workflows.

    Security Tool Optimization & Automation:

    • Fine-tune and configure SOC tools, including SIEM, EDR, IDS/IPS, SOAR, and firewalls for optimal performance.
    • Develop and automate security processes using scripting (e.g., Python, PowerShell, Bash) and SOAR platforms.
    • Identify gaps in security monitoring and implement improvements to enhance detection and response capabilities.

    Collaboration & Escalation:

    • Act as the escalation point for complex security incidents that Level 1 and Level 2 analysts cannot resolve.
    • Collaborate with security architects, network engineers, and IT teams to enhance security controls.
    • Work closely with threat intelligence teams to analyze and respond to emerging threats.

    Reporting & Documentation:

    • Maintain detailed documentation of security incidents, forensic findings, and response actions.
    • Generate executive reports and present security insights to management and stakeholders.
    • Improve and develop SOC playbooks, workflows, and best practices.

    Security Improvement Initiatives:

    • Participate in red team/blue team exercises to enhance security preparedness.
    • Conduct training sessions and mentorship programs for Level 1 and Level 2 analysts.
    • Drive continuous improvement of SOC processes, policies, and incident response methodologies.

    SOC Operations & Shift Management:

    • Provide leadership and direction during security incidents and crisis situations.
    • Participate in SOC shift rotations, including nights, weekends, and holidays.
    • Ensure timely response to security incidents while maintaining high-quality incident resolution.

    People Skills:

    • Strong leadership skills with experience mentoring and training junior analysts.
    • Excellent problem-solving and decision-making abilities in high-pressure situations.
    • Ability to communicate complex security concepts to both technical and non technical audiences.
    • Collaborative mindset, working effectively across teams and departments.
    • Strong analytical, research, and documentation skills.

    Qualifications:

    • Bachelor’s degree in Cybersecurity, Information Technology, or a related field (or equivalent experience).
    • 4+ years of experience in security operations, incident response, and cybersecurity analysis.
    • Strong understanding of cybersecurity frameworks (MITRE ATT&CK, NIST, ISO 27001).
    • Hands-on experience with SIEM, EDR, IDS/IPS, and other security tools.
    • Proficiency in scripting languages (Python, PowerShell, Bash) for automation and tool integration.
    • Deep knowledge of network security, threat intelligence, digital forensics, and malware analysis.

    Check how your CV aligns with this job

    Method of Application

    Interested and qualified? Go to Silensec on www.linkedin.com to apply

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at Silensec Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail