Soc Analyst at QT Global Software Ltd
QT Global Software Ltd |
Type: Job
Published: 2024-05-31 | Deadline: 2024-06-14
JOB ADVERTISEMENT
Duty Station: Kigali – Rwanda
Report to: Head of Cyber Security
Deadline for applicants: 14th June 2024
Submit CV, Cover letter, National ID and copy of Academic Degree to: https://career.qtsoftwareltd.com
About the Company
QT Global Software Ltd is a private company, engaged in web and mobile application development, information security consultancy, and network security services, providing secure solutions to esteemed clients. We collaborate with government agencies, companies, and organizations to create outstanding user experiences, secure solutions, and support and maintenance across the product/solution lifecycle.
At QT Global Software Ltd, we continuously transform our operations to ensure that we provide reliable and cost-effective client-oriented IT services. We achieve this by assembling the best resources in software development, IT infrastructure, and security, as well as the best project leads. We are proud of our past accomplishments and excited about our future prospects.
Our management philosophy and objectives revolve around two key principles:
- Firstly, we strive to become the preferred employer for the brightest and most talented minds in the region.
- Secondly, we prioritize the development, recognition, and rewarding of performance that we deem crucial to our long-term success and sustainability.
Company Values
All staff at QT Global Software Ltd are connected to a shared set of organizational values:
- Quality Customer Service
- Professional Business Conduct
- Client-Oriented and Secure Solutions
SOC ANALYST
ROLES AND RESPONSIBILITIES
- Implement and maintain an audit strategy for information systems (IS) based on risk management principles and risk analysis & assessment audits.
- Monitoring the ICT infrastructure for unusual traffic, security alerts, phishing attempts, unauthorized access, and intrusions and respond swiftly and effectively to mitigate threats.
- Collaborate with penetration testers to perform tests and identify network vulnerabilities, providing insights and recommendations for remediation.
- Develop and review company-wide best practices for IT security to ensure compliance with industry standards and regulatory requirements.
- Conduct research and evaluate emerging cyber security threats, assessing their potential impact on the organization, and devising strategies to manage and mitigate risks.
- Utilize advanced analytic tools and techniques to identify emerging threat patterns and vulnerabilities, enabling proactive threat detection and response.
- Maintain an information security risk register, documenting identified risks and assisting with internal and external audits related to information security.
- Generate comprehensive reports for both technical and non-technical staff and company management, summarizing security incidents, vulnerabilities, and risk management efforts.
QUALIFICATIONS & SKILLS
- Bachelor’s degree in computer science, Software Engineering, or a related field.
- Knowledge of IT security hardware, software, networking, and solutions.
- Proven experience in security operations, incident response, or related roles.
- Strong knowledge of SIEM systems and their configuration, customization, and optimization.
- Proficiency in analyzing security logs, tools, and data to detect and respond to security incidents.
- Analytical and problem-solving skills to identify and assess risks, threats, patterns, and trends.
- Familiarity with risk management frameworks, security regulations, and industry standards.
- Being certified in Information Security Domain (CISA, ISO, CEH, EC-CSA, CND, etc.)
- Familiarity with Security Regulations and Standards
- Ability to work under pressure, particularly when dealing with threats and at times of high demand.
- Excellent IT skills, including knowledge of computer networks, operating systems, IDS/IPS, Antiviruses, software, hardware, programming languages, and information security.
- An understanding of the cyber security risks associated with various technologies and ways to manage them.
N.B: Only shortlisted will be conducted.