Jobs

Security Monitoring and Triage Specialist ​at TeKnowledge

  • Contents
  • Open Jobs
    1. Security Monitoring and Triage Specialist
    2. Manager, Data Engineer
  • Method of Application

Security Monitoring and Triage Specialist ​at TeKnowledge

Security Monitoring and Triage Specialist

  • Job Type Full Time
  • Qualification BA/BSc/HND
  • Experience 5 – 10 years
  • Location Lagos
  • Job Field Science&nbsp

Req ID: 16972

About the Job

  • We’re seeking a Security Monitoring and Triage Specialist to strengthen our Security Operations Center (SOC) by detecting, analyzing, and prioritizing security incidents in real-time.
  • This role is critical to ensuring that threats are identified quickly, false positives are minimized, and high-priority alerts are escalated for immediate response.
  • The ideal candidate will be highly skilled in KQL, SIEM platforms, and proactive threat hunting.
  • At TeKnowledge, your work makes an impact from day one. We partner with organizations to deliver AI-First Expert Technology Services that drive meaningful impact in AI, Customer Experience, and Cybersecurity.
  • We turn complexity into clarity and potential into progress—in a place where people lead and tech empowers.
  • You’ll be part of a diverse and inclusive team where trust, teamwork, and shared success fuel everything we do.
  • We push boundaries, using advanced technologies to solve complex challenges for clients around the world.
  • Here, your work drives real change, and your ideas help shape the future of technology. We invest in you with top-tier training, mentorship, and career development—ensuring you stay ahead in an ever-evolving world.
  • We’re looking for innovators, problem-solvers, and experts ready to drive change and grow with us.

Responsibilities

  • Monitor security events across enterprise systems in real time.
  • Detect, analyze, and prioritize security incidents to ensure timely response.
  • Identify false positives and escalate high-priority threats to the incident response team.
  • Conduct proactive threat hunting to identify hidden risks and vulnerabilities.
  • Tune and optimize SIEM rules to improve detection accuracy and reduce noise.
  • Collaborate with SOC analysts, incident responders, and other security teams to resolve security issues.
  • Document findings and provide input for continuous improvement of monitoring and triage processes.

Qualifications
Education & Certifications:

  • 3-year IT-related degree (mandatory).
  • SC-401 and CompTIA CySA+ certifications (required).

Experience:

  • 5–10 years’ experience working in a Security Operations Center (SOC) with a focus on threat hunting and validation.
  • Strong hands-on expertise with SIEM platforms and KQL (Kusto Query Language).
  • Proven ability to triage incidents effectively and escalate critical threats.

Core Skills & Competencies:

  • Deep understanding of SOC operations, detection engineering, and threat analysis.
  • Strong analytical and problem-solving skills with the ability to differentiate between real threats and false positives.
  • Excellent communication and collaboration skills to work with cross-functional teams.
  • Ability to thrive in a fast-paced environment and make quick, accurate decisions under pressure.

Why You’ll Enjoy It Here

  • Be Part of Something Big – A growing company where your contributions matter.
  • Make an Immediate Impact – Support groundbreaking technologies with real-world results.
  • Work on Cutting-Edge Tech – AI, cybersecurity, and next-gen digital solutions.
  • Thrive in an Inclusive Team – A culture built on trust, collaboration, and respect.
  • We Care – Integrity, empathy, and purpose guide every decision.

go to method of application »

Method of Application


Leave a Comment