SOC Analyst – TIIR

A a cutting-edge cybersecurity firm dedicated to safeguarding businesses and organizations from digital threats worldwide. The firm specializes in providing comprehensive security solutions tailored to meet the unique challenges of modern cyber landscapes.

About the Role:
The Security Operations Centre Specialist – Threat Intelligence and Incident response will oversee the cybersecurity practices and procedures for threat intelligence and incident response, helping ensure robust protection of the digital assets and infrastructure of our customers and ourselves. This role is central to managing our cybersecurity solutions, developing strategies to mitigate risks, and maintaining high digital security standards. The ideal candidate is a dynamic and experienced specialist with a strong background in cybersecurity and a proven track record of managing security processes and procedures effectively.

What success looks like:

  • To promote the company as an efficient, accountable, and excellent service provider by ensuring that the best possible level of service quality and availability is maintained
  • Ensuring Excite Cyber’s SOC platform operates efficiently and securely so alerts and incidents are triaged, investigated and responded to as effectively as possible, with a specific focus on threat intelligence and incident response.
  • Ensuring customer service excellence and a commitment to quality outcomes
  • Building relationships within both the company and its clients
  • Contributing to a constructive and innovative workplace culture
  • Focusing on continuous improvement and innovation to drive improvement in customer satisfaction (CSAT) and Net Promoter Score (NPS).
  • Lead ongoing improvements to tools and processes for threat intelligence and incident response including contributing to overall solutions for monitoring and detection, playbook development as well as the orchestration and automation of SOC processes.
  • Develop the effectiveness of the Excite Cyber SOC processes and procedures to monitor security events and alerts from various sources.
  • Conduct thorough investigations of security incidents to determine root cause, impact and scope of a breach through detailed analysis of log data, network traffic and documentation of Indicators of Compromise (IoCs) discovered.
  • Act as an escalation point for security alerts triaged by SOC Analysts.
  • Provide mentoring and support to junior team members.
  • Take part in and lead Threat Hunts across our MDR customer base.

About You:

  • Bachelor’s degree in computer science, Information Technology, or a related field (or equivalent experience).
  • Relevant industry certifications such as GCIH, GCIA, GCFA, CISSP or similar highly regarded.

Preferred Experience

  • Minimum 5+ years working in Security Operations, Incident Response, Threat Hunting or Threat Intelligence
  • Strong knowledge of network protocols, security technologies and network architecture.
  • Extensive experience with security monitoring tools including SIEM, IDS/IPS, EDR and Vulnerability Scanners (such as ELK Microsoft Defender, Sentinel One, Trend Micro, Nessus).
  • Knowledge of security principles and best practices, including incident response methodologies and industry-standard frameworks (e.g. NIST, ISO 27001, ASD E8)
  • Familiarity with computer forensic investigation techniques and tools.
  • Understanding of common cyber threats, attack vectors and malware analysis.
  • Familiarity and exposure to cloud computing platforms and concepts.
  • Excellent knowledge of industry-standard frameworks such as MITRE ATT&CK.
  • Exposure and understanding of SOAR platforms highly regarded.
  • Previous experience in penetration testing or red team also highly regarded.


  • Strong knowledge of network protocols, network analysis tools and ability to perform analysis of associated network logs.
  • Excellent analytical and problem-solving skills, with a keen attention to details.
  • Proficiency in analysis of logs, network traffic and malware.
  • Familiarity with scripting languages (e.g. Python, PowerShell, JavaScript) for security automation and tool development.
  • Proven ability to effectively communicate, both verbally and written, including the development and delivery of oral presentations and written reports targeted for the appropriate audience.
  • Ability to liaise with all levels of internal and external customers and stakeholders
  • Willing and able to take on new challenges and gain new skills.
  • Ability to work well with others, as well as independently.
  • Technical, analytical, interpersonal and organization skills required.
  • A positive attitude

Mane Consulting specialise in IT and Business Services. For more information on this role or others like this in the market apply below or contact Paula at paula. bautista@

Upload your CV/resume or any other relevant file. Max. file size: 64 MB.