Job Search and Career Advice Platform

Enable job alerts via email!

SOC Engineer

Sabenza IT & Recruitment

Johannesburg

On-site

ZAR 600 000 - 800 000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A dynamic security firm in Johannesburg is seeking a highly skilled SOC Engineer to join their security team. The role involves monitoring, detecting, and responding to security threats, with hands-on experience in leading SIEM platforms such as Microsoft Sentinel and Splunk being essential. The ideal candidate will have over 3 years of experience in a SOC environment and strong analytical skills. Collaboration within an Agile team is key to bolstering the firm's security posture.

Qualifications

  • 3+ years experience in a Security Operations Centre or Cybersecurity operations environment.
  • Strong experience with major SIEM platforms.
  • Solid understanding of network security principles.

Responsibilities

  • Continuously monitor and analyse security events across multiple SIEM platforms.
  • Detect, investigate, and respond to security incidents.
  • Conduct malware analysis and proactive security assessments.

Skills

SIEM platforms
Incident response
Threat detection
Analytical skills

Tools

Microsoft Sentinel
Microsoft Defender
Splunk
QRadar
Job description

We are looking for a highly skilled SOC Engineer to join our dynamic security team. In this role, you will be responsible for monitoring, detecting, analysing, and responding to security threats across the enterprise environment. You’ll work hands‑on with leading SIEM platforms and collaborate within an Agile team to strengthen our security posture and safeguard critical systems.

Key Responsibilities
  • Continuously monitor and analyse security events across multiple SIEM platforms (e.g., Microsoft Sentinel, Microsoft Defender, Splunk, QRadar).
  • Detect, investigate, and respond to security incidents, ensuring timely remediation and escalation when required.
  • Conduct malware analysis, threat hunting, and proactive security assessments.
  • Support incident response activities including triage, evidence collection, containment, and post‑incident reviews.
  • Develop and fine‑tune detection rules, dashboards, and alerting use cases.
  • Collaborate closely with cross‑functional teams within an Agile environment to drive improvements in security tooling and processes.
  • Generate high‑quality reporting and communicate findings to both technical and non‑technical stakeholders.
  • Stay up to date with emerging threats, vulnerabilities, and cybersecurity trends.
Requirements
  • 3+ years experience in a Security Operations Centre or Cybersecurity operations environment.
  • Strong experience with major SIEM platforms (Sentinel, Defender, Splunk, QRadar).
  • Solid understanding of network security principles, malware behaviour, and security monitoring techniques.
  • Hands‑on experience in incident response, log analysis, and threat detection.
  • Strong analytical, problem‑solving, and troubleshooting capabilities.
  • Excellent verbal and written communication skills with proven Agile teamworking experience.

Preferred Certifications

  • CEH (Certified Ethical Hacker)
  • CompTIA Security+
  • Or other relevant cybersecurity certifications
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.