Enable job alerts via email!

Soc Engineer L3 Cyber Security Specialist

60 Degrees

Gauteng

On-site

ZAR 300 000 - 400 000

Full time

2 days ago
Be an early applicant

Job summary

A leading cybersecurity firm in South Africa is seeking a skilled individual to lead incident response and enhancement of threat intelligence within their Security Operations Centre. The ideal candidate will possess a strong background in SOC operations, engage in deep technical analysis, and contribute to advanced threat hunting strategies. This full-time position offers an opportunity to build and mentor a cyber defense team within a dynamic environment.

Qualifications

  • Proven experience in SOC operations (Defensive & Offensive).
  • Strong knowledge of SIEM platforms and detection engineering.
  • Threat analysis, risk triage, and attacker tradecraft.

Responsibilities

  • Lead Level 3 escalation and incident response efforts.
  • Enrich threat intelligence and validate detection hypotheses.
  • Conduct deep technical analysis of security events across multiple sources.

Skills

Threat analysis
Detection engineering
Scripting skills (Python, Bash, PowerShell)
Network architecture
Cybersecurity knowledge

Education

Degree or Diploma in Computer Science

Tools

SIEM platforms
Endpoint security (EDR/XDR)
IAM and cloud services (IaaS/SaaS)
Job description
About the Role

Job Description: Are you obsessed with uncovering digital threats, fine‑tuning detection strategies and architecting bullet‑proof incident response plans? Then stop scrolling – this is the opportunity you've been hunting for.

Join one of South Africa's fastest‑growing security enterprises as they expand their elite Security Operations Centre (SOC). They are not just building a team – they are assembling a cyber defence force.

Key Responsibilities
  • Lead Level 3 escalation and incident response efforts.
  • Enrich threat intelligence and validate detection hypotheses.
  • Author and execute advanced threat hunting strategies.
  • Serve as CSIRT Secretary for complex investigations.
  • Conduct deep technical analysis of security events across network, endpoint and log sources.
  • Mentor Detection and QA layers driving R&D enhancements.
  • Maintain and optimize IRPs and SLAs for MDR services.
  • Collaborate with cross‑functional teams and third‑party vendors.
  • Enhance defence playbooks and partner training modules.
Required Expertise
  • Degree or Diploma in Computer Science.
  • Proven experience in SOC operations (Defensive & Offensive).
  • Strong knowledge of SIEM platforms and detection engineering.
  • Network architecture and system administration.
  • Endpoint security (EDR/XDR), IAM and cloud services (IaaS/SaaS).
  • Threat analysis, risk triage and attacker tradecraft.
  • ISO, NIST, CIS, Mitre ATT&CK (beneficial).
  • Scripting skills (Python, Bash, PowerShell advantageous).
  • Industry certifications (CISSP preferred or in progress).
  • Valid driver’s licence or reliable transport (beneficial).

Employment Type: Full‑Time; Vacancy: 1; Salary: Not disclosed.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.