Job Search and Career Advice Platform

Enable job alerts via email!

Tier 2 Soc Analyst

Pro Q Consultancy

Gauteng

On-site

ZAR 300 000 - 400 000

Full time

2 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading security consultancy in Sandton, South Africa seeks a skilled Level 2 SOC Analyst. The role focuses on defending against cyber threats through monitoring, analysis, and incident response. Candidates should possess a bachelor's degree in Information Security or related fields, with at least 2-3 years of relevant experience. Strong knowledge of cybersecurity tools and practices is essential. This is an on-site position with a market-related salary and requires excellent problem-solving and communication skills.

Qualifications

  • 2-3 years of experience in a SOC or cybersecurity role focusing on monitoring, analysis, and incident response.
  • Hands-on experience with security tools such as SIEM, EDR, IDS/IPS.
  • Relevant certifications strongly preferred.

Responsibilities

  • Monitor and respond to escalated alerts and incidents.
  • Perform in-depth analysis of security events using various tools.
  • Lead incident investigations and document findings.

Skills

Threat Monitoring
Incident Response
Threat Analysis
Cybersecurity Best Practices
Communication Skills
Problem Solving

Education

Bachelor's degree in Information Security, Cybersecurity or related field

Tools

SIEM
IDS / IPS
Firewalls
Endpoint Protection
AWS
Azure
Python
Job description
Contract / Shift-based (24 / 7 SOC Operations)
Job Summary

We are looking for a skilled and detail-oriented Level 2 SOC Analyst to join our Security Operations Center (SOC) team.

This role is critical in defending against cyber threats by actively monitoring, analyzing, and responding to security incidents.

The Level 2 SOC Analyst will manage escalated alerts from Level 1, conduct in-depth threat analysis, and provide expert incident response to ensure the highest level of security for our clients' digital assets.

This position requires solid knowledge of cybersecurity best practices, incident response methodologies, and a thorough understanding of security technologies.

Key Responsibilities: Threat Monitoring & Analysis
  • Monitor and respond to escalated alerts and incidents identified by Level 1 SOC Analysts.
  • Perform in-depth analysis of security events using various security tools, such as SIEM, IDS / IPS, firewalls, and endpoint protection platforms.
  • Correlate security events across multiple sources to assess potential impact and identify indicators of compromise (IOCs).
  • Lead incident investigations, including containment, eradication, and recovery processes, following documented incident response procedures.
  • Escalate incidents to Level 3 or SOC Manager if necessary, providing detailed analysis and recommendations.
  • Document incidents, findings, and remediation actions thoroughly to support forensics, audit, and post-incident analysis.
Threat Hunting & Vulnerability Management
  • Conduct proactive threat hunting activities to detect potential threats and vulnerabilities.
  • Analyze logs and network traffic to identify suspicious activity patterns.
  • Work with the Vulnerability Management team to assess and mitigate vulnerabilities, applying patches, and updating signatures as needed.
  • Collaborate with internal teams, including IT, infrastructure, and application security, to enhance security postures.
  • Develop and present incident reports and threat analysis findings to senior team members, stakeholders, and management.
  • Provide guidance and mentorship to Level 1 SOC Analysts, supporting their professional development.
  • Review and refine SOC processes, playbooks, and incident response procedures to optimize efficiency.
  • Stay current with emerging cybersecurity threats, trends, and technologies to improve SOC operations.
  • Assist in training and upskilling SOC team members in advanced security analysis techniques.
Technical Skills
  • Strong knowledge of network security principles, threat intelligence, and incident response processes.
  • Proficiency in scripting (e.g., Python, Power Shell) and the ability to automate routine tasks.
  • Understanding of MITRE ATT&CK framework, NIST Cybersecurity Framework, and other security standards.
Soft Skills
  • Excellent problem‑solving and analytical skills with keen attention to detail.
  • Strong verbal and written communication skills, with the ability to explain complex security concepts to non‑technical stakeholders.
  • Ability to work well under pressure, adapt quickly to changing priorities, and manage multiple incidents effectively.
Preferred Qualifications
  • Experience working with cloud security tools and platforms (AWS, Azure, GCP).
  • Knowledge of regulatory requirements and standards, such as GDPR, HIPAA, and ISO.
  • Familiarity with threat intelligence platforms and the ability to correlate threat intelligence with SOC activities.
Qualifications
  • Bachelor's degree in Information Security, Cybersecurity, Computer Science, or related field.
  • Relevant certifications (Comp TIA Cy SA+, GIAC Certified Incident Handler, EC-Council Certified SOC Analyst, or similar) strongly preferred.
  • Minimum of 2-3 years of experience in a SOC or cybersecurity role, with a focus on monitoring, analysis, and incident response.
  • Hands‑on experience with security tools such as SIEM, EDR, IDS / IPS, firewalls, and vulnerability management solutions.
  • Experience analyzing and responding to cybersecurity incidents, including malware analysis, threat hunting, and threat intelligence.
Location

Sandton, South Africa – on-site role.

Salary

Market Related.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.