Make CyberSOC your next move | CyberSOC


CyberSOC Internship Challenge 2022 | 11th Edition


Thank you to everyone who applied!
Follow us on our social media channels for more information on upcoming editions and future opportunities


CyberSOC Africa is a leading provider of cyber security services. At CyberSOC we appreciate new ideas and perspectives, coming from individuals with experience which we find valuable to us to join our existing team of competent staff. As long as you have 1-3 years of Information Technology background that translates to our core business, we would be glad to have you join our training program..

You will find your experience both rewarding and challenging, so if you’re looking for a place to develop your career, this is a journey you’ll want to be a part of.


Eligibility Criteria:

  • Minimum of 1 year relevant experience in the Information Technology (IT) industry

  • Must be either a Nigerian/Kenyan/Zambian/Benin Republic/Angola Resident


You will be trained on cyber-security fundamental topics, cyber-security operation center technologies and methodology, cyber-security incident response technology and methodology, cyber threat intelligence methodology and security.


An enabling learning environment, comprehensive Cyber Security Training Curriculum, Practical/hands on training scenarios. An opportunity to be hired as a Cyber Security Professional once you can scale through all the hurdles and tests, a rewarding Career growth plan into roles such as:

  1. Cyber Security Analyst Tier 1

    Tier 1 SOC analysts are trained specialists who monitor, manage, and configure security tools, review incidents to assess their urgency, and escalate incidents if necessary.

  2. Cyber Security Analyst Tier 2

    Incident Responder. All Tier1 skills +. Reviews trouble ticket generated byTier1 analysts and use threat Intelligence to identify infected/affected systems and scope of the attack.

  3. Cyber Intelligence Analyst OSINT

    Cyber intelligence analysts utilize threat intelligence to mitigate any potential data threats and defend data as well as compile reports that identify ways to pinpoint and prepare for potential threats.

  4. Digital Forensics Investigator

    A Computer Forensics Investigator or Forensic Analyst is a specially trained professional, to retrieve information from computers and other types of data storage devices.

  5. Cyber Security Engineer

    Cyber-security engineers, identify threats and vulnerabilities in systems and software, and apply their skills to developing and implementing high-tech solutions to defend against hacking, malware, ransomware, insider threats and all types of cybercrime.

  6. Cyber Incident Responder

    This role investigates, analyzes, and responds to cyber incidents within the network environment or enclave.

  7. Red Team Penetration tester

    Red teaming is a much broader approach to penetration testing that uses the methods of real-life attackers to test if an attackis possible through an evaluation of the organization's security controls, threat intelligence, and incident response procedures.

Protect Me

Experiencing a security incident

Contact Us
Whatsapp icon Contact Us