Enable job alerts via email!

Tier 2 Soc Analyst

Old Mutual

Johannesburg

On-site

ZAR 60 000 - 100 000

Full time

Yesterday
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

Join a forward-thinking company dedicated to securing digital assets across Africa. As an SOC Analyst specializing in L2, you will leverage your extensive skills in security operations and threat intelligence. Your role will involve collaborating with teams to identify and mitigate threats, utilizing Microsoft Sentinel as your primary tool. This position offers the opportunity to enhance your expertise in a dynamic environment while contributing to continuous improvements in security practices. If you are passionate about cybersecurity and eager to make a significant impact, this role could be perfect for you.

Qualifications

  • 6+ years’ experience in a SOC environment with focus on threat hunting.
  • Relevant certifications such as CISSP, CEH, or similar are advantageous.

Responsibilities

  • Conduct advanced threat hunting activities to mitigate potential threats.
  • Utilize Microsoft Sentinel to monitor security alerts and analyze threats.

Skills

Microsoft Sentinel
Threat Hunting
Cybersecurity
Analytical Skills
Problem-Solving
Communication Skills

Education

Bachelor's degree in Information Technology
NQF Level 5 - Higher Certificate

Tools

SIEM Tools
Python
PowerShell

Job description

Let's Write Africa's Story Together!

Old Mutual is a firm believer in the African opportunity and our diverse talent reflects this.

Job Description

Old Mutual Insure is seeking an SOC Analyst specializing in L2. In this critical role, you will leverage your extensive experience and skills in security operations and threat intelligence to safeguard our digital assets. Our environment utilizes Microsoft Sentinel as the primary SIEM tool, and your expertise in this area will be pivotal in our continuous efforts to enhance our security posture.

Key Responsibilities:

  • Collaborate with the Threat Hunter Lead and conduct advanced threat hunting activities to identify and mitigate potential threats before they impact the business.

  • Utilize Microsoft Sentinel to monitor security alerts and perform in-depth analysis of complex threats.

  • Analyze complex security alerts and incidents to determine their severity and impact, ensuring timely and accurate response actions.

  • Collaborate with Level 1 analysts and other cybersecurity teams to resolve security incidents efficiently.

  • Provide expert analysis and evaluation of security incidents to determine root causes and propose system adjustments.

  • Assist in the mentoring and training of Level 1 analysts to develop their skills in threat detection and analysis.

  • Produce detailed incident reports and briefings for both technical and non-technical stakeholders.

  • Document and report incidents, ensuring that all activities are recorded and compliant with industry standards.

  • Participate in continuous improvement initiatives to enhance the tools and processes used by the SOC.

  • Participate in cybersecurity awareness training initiatives and contribute to the development of best practices for threat detection and mitigation

Job Requirements -Experience , Skills and Qualifications:

  • Bachelor’s degree in Information Technology, Cybersecurity, or a related field.

  • Minimum of 6 years’ experience in a SOC environment with at least 2 years focused on threat hunting.

  • Proven expertise with Microsoft Sentinel and other SIEM tools.

  • Strong understanding of network protocols, encryption techniques, and forensic analysis.

  • Relevant certifications such as CISSP, CEH, CSA, CySA+, GCIH, GCFA, or similar will be considered an advantage.

  • Excellent analytical and problem-solving skills.

  • Strong communication skills and ability to work collaboratively in a dynamic team environment.

Preferred Skills:

  • Experience with scripting languages such as Python or PowerShell to automate tasks and analyze data.

  • Prior experience in developing and conducting security training and simulation exercises.

  • Deep knowledge of current cybersecurity threats, attack techniques, and landscape.

Skills

Computer Literacy, Database Administration, Database Management Systems (DBMS), Database Queries, Data Controls, Document Management, Executing Plans, Expertise Management System, Knowledge Management, Metadata Management, Object-Oriented Database Management System (OODBMS), Office Systems, Oral Communications, Policies & Procedures, Test Case Management

Competencies

Collaborates Communicates Effectively Decision Quality Ensures Accountability Manages Complexity Optimizes Work Processes Plans and Aligns Tech Savvy

Education

Bachelor Commerce: Information Technology (Required), NQF Level 5 - Higher, Advance or Occupational Certificate or equivalent

Closing Date

15 May 2025 , 23:59

The appointment will be made from the designated group in line with the Employment Equity Plan of Old Mutual South Africa and the specific business unit in question.

The Old Mutual Story!

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.