The Role
The SOC L3 – Security Intelligence & Analytics role is a senior cybersecurity position within the 5G Intelligence and Analytics function. The role is accountable for advanced threat detection, investigation, and response across 4G/5G RAN and Core environments, including development of 5G-specific security use cases, playbooks, and continuous improvement of the SOC security posture.
Duties & ResponsibilitiesDesign and deploy 5G security use cases across SOC platforms for RAN and Core networks
Analyze 5G protocols, traffic flows, and architectures to identify advanced threats
Develop and maintain incident response playbooks and SOPs
Lead root cause analysis and advanced investigations for high‑severity incidents
Contain, remediate, and mitigate security incidents with minimal business impact
Leverage SIEM, SOAR, IDS/IPS tools to analyze and neutralize threats
Operationalize threat intelligence to strengthen proactive detection capabilities
Collaborate with cross‑functional teams to implement preventive security controls
Define and present KPIs, KRIs, and SOC performance metrics
Mentor SOC analysts and contribute to capability uplift and knowledge sharing
Bachelors or Masters degree in Cybersecurity, IT, or related field
Minimum 5 years experience in a SOC environment
Strong expertise in 4G/5G security operations and telecom networks
Hands‑on experience with Splunk, Microsoft Sentinel, SIEM, SOAR, IDS/IPS
Proven experience managing high‑severity incidents across IT and OT environments
Strong analytical, documentation, and stakeholder communication skills
ISP/telecom experience is a strong advantage
Certifications preferred: CISSP, GCIH, GCIA, Elastic Certified Analyst, BTL1, MITRE ATT&CK Defender, CCNA/CCNP Cyber Ops
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).