{"id":2449,"date":"2026-04-16T08:00:31","date_gmt":"2026-04-16T08:00:31","guid":{"rendered":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/job\/security-operations-center-engineer-soc-at-kifiya-financial-technologies\/"},"modified":"2026-04-16T08:00:46","modified_gmt":"2026-04-16T08:00:46","slug":"security-operations-center-engineer-soc-at-kifiya-financial-technologies","status":"publish","type":"job_listing","link":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/job\/security-operations-center-engineer-soc-at-kifiya-financial-technologies\/","title":{"rendered":"Security Operations Center Engineer (SOC) at Kifiya Financial Technologies"},"content":{"rendered":"<p>About the Job<\/p>\n<p>Location:<br \/>\nAddis Abeba<\/p>\n<p>Department:<br \/>\nCISO<\/p>\n<p>Reports To:<br \/>\nHead, Cyber Security<\/p>\n<p>About Kifiya:<br \/>\nKifiya is an AI-powered financial and market infrastructure company advancing inclusive economic growth across Africa. We design and deploy risk decisioning systems, intelligent financial infrastructure, and market linkage platforms that unlock credit, insurance, payments, and capital access for MSMEs and smallholder farmers. We build the AI, data, and financial infrastructure that helps financial institutions serve hard-to-finance segments at scale.<\/p>\n<p>Business Unit Description<br \/>\nThe CISO Unit safeguards Kifiya\u2019s enterprise systems, AI-driven financial infrastructure, data assets, internal technology stack, and digital transformation programs.<br \/>\nThe unit ensures enterprise-wide protection, operational continuity, regulatory compliance, secure architecture design, and automation governance aligned with global best practices and financial sector standards.<\/p>\n<p>Position Summary<br \/>\nThe SOC Engineer is responsible for continuous monitoring of Kifiya\u2019s enterprise security environment, detection of cyber threats, investigation of security incidents, and escalation of potential compromises affecting enterprise systems.<br \/>\nThe role ensures that security telemetry across infrastructure, cloud platforms, applications, and identity systems is actively monitored and analyzed. The SOC Engineer plays a critical role in identifying suspicious activity early, supporting incident response operations, and improving detection capabilities across the organization.<\/p>\n<p>Key Responsibilities<br \/>\nSecurity Monitoring and Threat Detection<\/p>\n<p>Continuously monitor enterprise security systems for indicators of compromise.<br \/>\nAnalyze alerts generated by security monitoring platforms.<br \/>\nInvestigate abnormal system activity across infrastructure, applications, and identity systems.<br \/>\nCorrelate security events from multiple sources to identify potential threats.<br \/>\nMaintain continuous situational awareness of enterprise security posture.<\/p>\n<p>Incident Investigation and Escalation<\/p>\n<p>Investigate potential security incidents including malware, phishing attempts, credential compromise, and system intrusion.<br \/>\nDocument incident findings and escalate high severity incidents to the Director of Cyber Security.<br \/>\nSupport incident response activities by collecting and analyzing security event data.<br \/>\nMaintain detailed incident logs and investigation records.<\/p>\n<p>Threat Hunting<\/p>\n<p>Conduct proactive threat hunting activities across enterprise systems.<br \/>\nAnalyze historical logs and telemetry to identify potential undetected threats.<br \/>\nIdentify patterns that may indicate sophisticated cyber attacks.<br \/>\nRecommend improvements to detection rules and monitoring coverage.<\/p>\n<p>Security Monitoring Platform Management<\/p>\n<p>Operate and maintain enterprise security monitoring platforms.<br \/>\nEnsure log ingestion from infrastructure, applications, and identity systems.<br \/>\nTune detection rules to reduce false positives and improve detection accuracy.<br \/>\nMaintain monitoring coverage across all mission critical systems.<\/p>\n<p>Phishing and Malware Investigation<\/p>\n<p>Investigate suspected phishing attacks targeting employees.<br \/>\nAnalyze malicious attachments and suspicious communications.<br \/>\nCoordinate with IT and cybersecurity teams to contain malicious activity.<br \/>\nEducate users when phishing activity is detected.<\/p>\n<p>Detection Improvement and Continuous Monitoring<\/p>\n<p>Improve threat detection capabilities through rule tuning and behavioral analysis.<br \/>\nIdentify monitoring gaps and recommend improvements.<br \/>\nEnsure continuous evolution of detection capabilities as threats evolve.<\/p>\n<p>Key Outputs<br \/>\nSecurity Monitoring<br \/>\n\u2022 Continuous monitoring coverage across enterprise systems<br \/>\n\u2022 Accurate detection of suspicious activity across infrastructure, applications, and identity systems<br \/>\nIncident Detection<br \/>\n\u2022 Rapid identification and escalation of cyber incidents<br \/>\n\u2022 Comprehensive incident investigation documentation<br \/>\nThreat Intelligence<br \/>\n\u2022 Identification of emerging threats targeting enterprise infrastructure<br \/>\nMonitoring Improvement<br \/>\n\u2022 Improved detection accuracy through tuning of monitoring systems<\/p>\n<p>About You<\/p>\n<p>Qualifications and Experience<br \/>\n\u2022 Bachelor\u2019s degree in Cybersecurity, Information Security, Computer Science, or related discipline.<br \/>\n\u2022 Minimum three to five years of experience in security operations or security monitoring roles.<br \/>\n\u2022 Experience working with security monitoring platforms and log analysis systems.<br \/>\n\u2022 Experience investigating security incidents and suspicious activity.<br \/>\n\u2022 Cybersecurity certifications such as Security+, CEH, or equivalent are desirable.<br \/>\nCore Competencies<br \/>\n\u2022 Security monitoring and incident detection<br \/>\n\u2022 Log analysis and event correlation<br \/>\n\u2022 Threat hunting techniques<br \/>\n\u2022 Incident investigation and documentation<br \/>\n\u2022 Security monitoring platform operation<\/p>\n","protected":false},"author":2,"featured_media":0,"template":"","meta":{"_promoted":"","_job_location":"","_application":"http:\/\/-hr@kifiya.com","_company_name":"Kifiya Financial Technologies","_company_website":"","_company_tagline":"","_company_twitter":"","_company_video":"","_filled":0,"_featured":0,"_remote_position":0,"_job_salary":"","_job_salary_currency":"","_job_salary_unit":""},"job_listing_region":[11],"job-categories":[],"job-types":[12],"class_list":{"0":"post-2449","1":"job_listing","2":"type-job_listing","3":"status-publish","4":"hentry","5":"job_listing_region-ethiopia","7":"job-type-full-time"},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/wp-json\/wp\/v2\/job-listings\/2449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/wp-json\/wp\/v2\/job-listings"}],"about":[{"href":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/wp-json\/wp\/v2\/types\/job_listing"}],"author":[{"embeddable":true,"href":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/wp-json\/wp\/v2\/users\/2"}],"wp:attachment":[{"href":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/wp-json\/wp\/v2\/media?parent=2449"}],"wp:term":[{"taxonomy":"job_listing_region","embeddable":true,"href":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/wp-json\/wp\/v2\/job_listing_region?post=2449"},{"taxonomy":"job_listing_category","embeddable":true,"href":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/wp-json\/wp\/v2\/job-categories?post=2449"},{"taxonomy":"job_listing_type","embeddable":true,"href":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/wp-json\/wp\/v2\/job-types?post=2449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}