CISOC Analyst

Kenya

KEY RESPONSIBILITIES: MUST NOT BE MORE THAN 10 

• Monitor user and system activity to identify suspicious activities leveraging on security systems. 

• Monitor network activity and investigate anomalous events and traffic trends 

• Check security monitoring status of systems on monitoring tools and initiate remediation of noted gaps. 

 Monitor alerts and alarms from security monitoring tools and initiate corrective actions 

• Configure and finetune security monitoring systems to make sure the Bank is sufficiently protected 

• Administer security tools ensuring optimal uptime and resource utilization 

• Investigate suspicious user and system events and identify breaches and root cause. 

• Mitigate intrusion attempts through proactive response to incidents. 

• Prepare manual and scheduled reports for various stakeholders 

• Research and stay up-to-date on technology and cybersecurity trends 

DAILY RESPONSIBILITIES: NOT MORE THAN 5 OF THE MOST TYPICAL 

• Monitor event logs from various systems (firewalls, email, web and DNS, databases, etc) to identify suspicious activities for attacks, intrusions, and unusual, unauthorized, or illegal activity. 

• Perform incident drilldowns and investigations and escalate validated incident to designated incident response teams. 

• Follow up on security incidents with relevant support teams and ensure timely resolution. 

• Administer the performance, resource utilisation and overall health of the Bank’s security monitoring tools. 

• Prepare and circulate SOC management reports and dashboards

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: DNS Firewalls Incident response Monitoring SOC

Region: Africa
Country: Kenya

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.