L3 Security Analyst

Experience: years

Roles and Responsibilities:

  • Threat Intelligence Analysis: Advanced skills in analysing threat intelligence to identify and mitigate potential security risks and emerging threats.
  • Incident Response Management: Ability to manage complex security incidents, including incident response planning, team management, and coordination with external stakeholders.
  • Security Analytics and Threat Hunting: Advanced skills in using security analytics and threat hunting techniques to proactively detect and respond to security threats.
  • Document and Release Security Advisories to all SOC customers.
  • Facilitating the creation of new techniques designed to prevent and detect new types of threats.
  • Threat Hunting by analysing dashboards, trends, logs, metadata, and reports.
  • Study trends in cybercrime around threat actors’ behaviours, tactics, and goals.
  • Use case development and suggestions.
  • Search for vulnerabilities and risk factors in data and systems.
  • Publish weekly reports to applicable teams.
  • Generate daily/weekly/monthly reports on SOC activity.


  • Bachelor’s degree or equivalent and 7-12 years of progressive, security-related experience.
  • Must have experience with Azure Sentinel SIEM.
  • Minimum 2 years of SOC lead experience.
  • Incident Handling and Incident Response experience.