Tek Experts provides the services of a uniquely passionate and expert workforce that takes intense pride in helping companies manage their business operations. We care about the work we do, the companies we partner with and the customers they serve.
By delivering unrivaled levels of business and IT support, we make sure nothing gets in the way of our clie...
Read more about this company
The SOC Analyst will be responsible for real-time monitoring and analysis of security alerts using SIEM platforms, handling initial triage, and escalating confirmed incidents. You'll collaborate closely with other SOC team members and stakeholders to ensure continuous situational awareness, adherence to SLAs, and delivery of high-quality security services.
Responsibilities
Continuously monitor and analyze security alerts generated by SIEM and other detection platforms.
Perform initial triage and classification of potential security incidents.
Escalate validated incidents to higher-tier SOC analysts with appropriate documentation and evidence.
Execute runbooks/playbooks for known alert patterns and threat types.
Document incident details, timelines, and response actions in the incident tracking system.
Generate, review, and distribute detailed SOC activity and incident response reports.
Collaborate with internal and external teams to resolve security incidents effectively.
Maintain awareness of emerging cyber threats, attack vectors, and industry developments.
Follow defined SLAs, escalation paths, and incident handling procedures.
Contribute to high-quality service delivery and client-specific threat mitigation initiatives.
Ensure seamless handoffs and situational awareness through effective team collaboration.
Qualifications
1-3 years of experience working in a Security Operations Center (SOC) environment.
Hands-on experience with SIEM tools for event investigation, alert filtering, and rule analysis.
Strong understanding of cybersecurity principles, threat actors, and common attack techniques.
Familiarity with: Network protocols and traffic analysis, Windows and Linux logs, Endpoint protection tools, System hardening best practices
Awareness of the MITRE ATT&CK framework and its application to threat detection.
Basic proficiency in query languages such as KQL is a plus.
Strong analytical, troubleshooting, and communication skills.
Attention to detail and the ability to manage tasks in a high-pressure, dynamic environment.
Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
Preferred certifications include:, Microsoft SC-200 (Security Operations Analyst Associate), CompTIA Security+, CySA+, or CEH (Certified Ethical Hacker), Other relevant certifications in incident detection and response
30 Contract Staffing Risks That Could Get Your Company SuedThis piece outlines 30 contract staffing risks that have real legal consequences under Nigerian law. If you are a business owner, HR professional, or staffing agency operator, you will find this highly valuable.
10 Steps to Building an Effective Talent PipelineLearn how to keep a list of good candidates ready in advance, before a role becomes vacant. Discover step by step the process of building a talent pipeline that works.
2026 / 2027 NEPL / OERNL Joint Venture Tertiary Scholarship Scheme (National Merit Award)The NEPL/OERNL Joint Venture in pursuance of its Corporate Social Responsibility invites suitably qualified applicants for its 2026/2027 Tertiary Scholarship Scheme, commencing Tuesday, March 3, 2026, and concluding on Wednesday, April 1, 2026. For applicants from Non-Host/Transit Communities