About Company:
Korapay is a payment infrastructure servicing a wide band of businesses making local and international payments. We are a marketplace for digital financial services across Africa. Our vision, which is at the core of what we do every day, is to create a world void of digital financial barriers across Africa. We are committed to delivering reliable, secure, and easy to use digital financial solutions to every single customer with a guarantee that it is improving their lives.
Job Description:
Kora is seeking a vigilant and analytical SOC Analyst to join our security team. You will be on the front lines of our digital defense, responsible for monitoring, detecting, and neutralizing cybersecurity threats in real-time. This role is essential to maintaining Kora’s security posture, requiring you to leverage advanced security tooling, threat intelligence, and a disciplined incident response framework to protect our assets and customers.
The ideal candidate possesses a deep investigative mindset and the ability to maintain peak performance in a high-pressure, fast-paced environment.
Requirements:
Monitoring & Incident Detection
Real-time Surveillance: Monitor security events and alerts across SIEM, EDR, IDS/IPS, Firewalls, and cloud security tools.
Log Analysis: Analyze logs and system alerts to identify potential security incidents, anomalies, or unauthorized activities.
Triage & Escalation: Perform initial triage to determine the severity and scope of threats, escalating validated incidents according to established procedures.
Incident Response & Remediation
Threat Mitigation: Investigate and respond to various security threats, including phishing, malware, and unauthorized access.
Containment: Collaborate with IT and Engineering teams to contain and remediate active threats efficiently.
Documentation: Maintain meticulous incident logs, documenting all actions taken and contributing to post-incident root cause analysis.
Threat Intelligence & Hunting
Proactive Defense: Leverage threat intelligence feeds to identify emerging indicators of compromise (IOCs).
Threat Hunting: Conduct proactive hunting activities to detect hidden threats that may have bypassed automated controls.
Detection Tuning: Update detection rules and use cases based on the evolving threat landscape to improve system accuracy.
Security Support & Collaboration
Vulnerability Management: Support scan reviews and prioritization while tracking remediation efforts.
Control Improvement: Partner with engineering teams to enhance security controls and validate the effectiveness of security patches.
Reporting: Prepare daily and weekly SOC reports and dashboards for leadership review.
Qualifications and Skills:
Education: Minimum of a Bachelor’s Degree in Computer Science, Cybersecurity, or a related field.
Experience: 2–4 years of experience in a SOC environment or a core cybersecurity role.
Technical Skills:
Tools: Hands-on experience with SIEM (e.g., Splunk, QRadar) and EDR (e.g., CrowdStrike, Defender).
Protocols: Strong understanding of network protocols, operating systems, and common attack vectors.
Automation: Proficiency in scripting (Python, PowerShell, or Bash) is highly preferred.
Frameworks: Familiarity with MITRE ATT&CK, NIST, or ISO 27001.
Core Competencies:
Analytical Mindset: Strong investigative skills with a focus on critical thinking.
Resilience: Ability to work under pressure in a 24/7 environment.
Communication: Excellent incident documentation and interpersonal skills.
Salary
Very attractiveApplication Closing Date: Not specified
Application Instructions:
Click the button below to apply
Job Information
Deadline
Not specified
Job Type
Full-time
Industry
Analyst
Work Level
Experienced
State
Not specified
Country
Nigeria