Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
About Sekuro
We are the challenger in the cyber security market globally. We are founder-led and have a fresh and direct approach to working with our clients. Over our journey we have helped many organisations of different sizes in improving their understanding of cyber security through uplifting their existing capability. We do this by reducing risk, building business resilience, and promoting continuous innovation.
About the role
We're seeking a Cyber Security Analyst (L2) to join a highly talented Security Operations team. In this role, you'll be responsible for deploying and uplifting defensive actions to safeguard our clients.
This position will ultimately lead to a rare opportunity to work across both offensive and defensive domains and assist in enhancing our SOC's threat detection and response capabilities.
Key Responsibilities
Monitoring & Triage:
- Review and analyse alerts from SIEM platforms (e.g., Splunk, Logscale, Sentinel, or Elastic) in a timely manner.
- Perform initial assessments and triage of security anomalies, escalating issues appropriately or investigating incidents using available resources.
Incident Response & Threat Hunting:
- Execute cloud incident response procedures, with strong working knowledge of AWS and Azure environments and service logs.
- Conduct Proactive, Indicator and Exploratory threat hunting based on current threat intelligence and hypothesis development.
- Perform incident response tasks to mitigate risks and limit potential damage.
Process Improvement & Documentation:
- Review and update detection rules, process documentation, and playbooks.
- Collaborate with other teams to enhance understanding of customer environments and emerging threats.
- Identify deficiencies in monitoring systems and propose improvements.
Intelligence & Reporting:
- Analyse regular intelligence briefs to stay updated on the evolving threat landscape.
- Maintain and update dashboards, reports, and alerting mechanisms to ensure effective monitoring.
- Contribute to continuous service improvements within the SOC.
Skills and Experience
Technical Expertise:
- Proven experience with SIEM platforms such as Splunk, Logscale, Sentinel, or Elastic.
- Strong cloud incident management and investigation skills, specifically within AWS and Azure environments.
- Prior experience in system administration, threat detection, and threat hunting.
- Proficiency in scripting (e.g., Python, PowerShell, or similar languages) to automate tasks and analyse data.
- Minimum of 2 years' experience in a Cyber Security Operation Centre.
Certifications (Preferred):
- OSCP, PNPT, EJPT, BTL1, BTL2, PJPT, PCSA, CDSA, or SANS GCIH
General Competencies:
- Excellent analytical skills and attention to detail.
- Ability to develop solutions to complex problems under pressure.
- Understanding of best practices in network security, security operations, systems security, policy, and incident response.
- Strong communication skills, both written and verbal.
Key Skills
Ranked by relevanceReady to apply?
Join Sekuro and take your career to the next level!
Application takes less than 5 minutes