- Contents
- Open Jobs
- Security Monitoring and Triage Specialist
- Manager, Data Engineer
-
Method of Application
Security Monitoring and Triage Specialist at TeKnowledge
Security Monitoring and Triage Specialist
- Job Type Full Time
- Qualification BA/BSc/HND
- Experience 5 – 10 years
- Location Lagos
- Job Field Science 
Req ID: 16972
About the Job
- We’re seeking a Security Monitoring and Triage Specialist to strengthen our Security Operations Center (SOC) by detecting, analyzing, and prioritizing security incidents in real-time.
- This role is critical to ensuring that threats are identified quickly, false positives are minimized, and high-priority alerts are escalated for immediate response.
- The ideal candidate will be highly skilled in KQL, SIEM platforms, and proactive threat hunting.
- At TeKnowledge, your work makes an impact from day one. We partner with organizations to deliver AI-First Expert Technology Services that drive meaningful impact in AI, Customer Experience, and Cybersecurity.
- We turn complexity into clarity and potential into progress—in a place where people lead and tech empowers.
- You’ll be part of a diverse and inclusive team where trust, teamwork, and shared success fuel everything we do.
- We push boundaries, using advanced technologies to solve complex challenges for clients around the world.
- Here, your work drives real change, and your ideas help shape the future of technology. We invest in you with top-tier training, mentorship, and career development—ensuring you stay ahead in an ever-evolving world.
- We’re looking for innovators, problem-solvers, and experts ready to drive change and grow with us.
Responsibilities
- Monitor security events across enterprise systems in real time.
- Detect, analyze, and prioritize security incidents to ensure timely response.
- Identify false positives and escalate high-priority threats to the incident response team.
- Conduct proactive threat hunting to identify hidden risks and vulnerabilities.
- Tune and optimize SIEM rules to improve detection accuracy and reduce noise.
- Collaborate with SOC analysts, incident responders, and other security teams to resolve security issues.
- Document findings and provide input for continuous improvement of monitoring and triage processes.
Qualifications
Education & Certifications:
- 3-year IT-related degree (mandatory).
- SC-401 and CompTIA CySA+ certifications (required).
Experience:
- 5–10 years’ experience working in a Security Operations Center (SOC) with a focus on threat hunting and validation.
- Strong hands-on expertise with SIEM platforms and KQL (Kusto Query Language).
- Proven ability to triage incidents effectively and escalate critical threats.
Core Skills & Competencies:
- Deep understanding of SOC operations, detection engineering, and threat analysis.
- Strong analytical and problem-solving skills with the ability to differentiate between real threats and false positives.
- Excellent communication and collaboration skills to work with cross-functional teams.
- Ability to thrive in a fast-paced environment and make quick, accurate decisions under pressure.
Why You’ll Enjoy It Here
- Be Part of Something Big – A growing company where your contributions matter.
- Make an Immediate Impact – Support groundbreaking technologies with real-world results.
- Work on Cutting-Edge Tech – AI, cybersecurity, and next-gen digital solutions.
- Thrive in an Inclusive Team – A culture built on trust, collaboration, and respect.
- We Care – Integrity, empathy, and purpose guide every decision.
go to method of application »
Method of Application

Leave a Comment