CISOC Analyst
Kenya
KCB Group
KEY RESPONSIBILITIES: MUST NOT BE MORE THAN 10
• Monitor user and system activity to identify suspicious activities leveraging on security systems.
• Monitor network activity and investigate anomalous events and traffic trends
• Check security monitoring status of systems on monitoring tools and initiate remediation of noted gaps.
Monitor alerts and alarms from security monitoring tools and initiate corrective actions
• Configure and finetune security monitoring systems to make sure the Bank is sufficiently protected
• Administer security tools ensuring optimal uptime and resource utilization
• Investigate suspicious user and system events and identify breaches and root cause.
• Mitigate intrusion attempts through proactive response to incidents.
• Prepare manual and scheduled reports for various stakeholders
• Research and stay up-to-date on technology and cybersecurity trends
DAILY RESPONSIBILITIES: NOT MORE THAN 5 OF THE MOST TYPICAL
• Monitor event logs from various systems (firewalls, email, web and DNS, databases, etc) to identify suspicious activities for attacks, intrusions, and unusual, unauthorized, or illegal activity.
• Perform incident drilldowns and investigations and escalate validated incident to designated incident response teams.
• Follow up on security incidents with relevant support teams and ensure timely resolution.
• Administer the performance, resource utilisation and overall health of the Bank’s security monitoring tools.
• Prepare and circulate SOC management reports and dashboards
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: DNS Firewalls Incident response Monitoring SOC
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Senior Product Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Cyber Security Architect jobs
- Open Cyber Security Specialist jobs
- Open Product Security Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Senior Information Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Consultant SOC / CERT H/F jobs
- Open IT Security Analyst jobs
- Open Senior Information Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open Senior Penetration Tester jobs
- Open IT Security Engineer jobs
- Open Security Operations Analyst jobs
- Open Cybersecurity Specialist jobs
- Open Sr. Security Engineer jobs
- Open Security Consultant jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open Pentesting-related jobs
- Open Agile-related jobs
- Open Application security-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open ISO 27001-related jobs
- Open Threat intelligence-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open Java-related jobs
- Open APIs-related jobs
- Open Security Clearance-related jobs
- Open Forensics-related jobs
- Open SaaS-related jobs
- Open CEH-related jobs
- Open EDR-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open DoD-related jobs