Emplois en direct

Découvrez et Postulez pour des emplois

SOC L2

Permanent
Riyadh, SA
30.09.2024

SOC L2

 Riyadh, SA

 

Permanent

Our Client

A well-established Cyber Security company based in Saudi Arabia are looking for a Senior SOC Analyst. This role is part of the companies Saudization initiative, so only Saudi Nationals will be considered for this position.

Key Responsibilities:

  • Monitoring & Incident Detection:
    Continuously monitor security events through QRadar SIEM and other security tools, identifying potential threats, anomalies, and malicious activities.

  • Incident Triage & Response:
    Analyze and triage escalated alerts from L1 SOC analysts. Classify the incidents according to severity, urgency, and potential impact on the business.

  • Investigation & Threat Hunting:
    Conduct thorough investigations of suspicious events or activities. Use QRadar’s advanced capabilities to perform threat hunting and identify vulnerabilities or gaps in the system.

  • Malware Analysis & Forensics:
    Conduct malware analysis and digital forensics as required to understand the nature of the attack and the methods used by threat actors.

  • Security Incident Management:
    Respond to and mitigate security incidents, documenting incident reports, creating post-incident reviews, and providing feedback for remediation and security improvements.

  • Collaboration & Escalation:
    Work closely with L1 SOC analysts, IT teams, and management. Escalate critical incidents to L3 analysts or the SOC Manager when required.

  • QRadar Administration & Optimization:
    Assist in the maintenance and tuning of the QRadar SIEM tool to ensure optimal performance and detection capabilities.

  • Vulnerability Assessment:
    Review and assist in the management of vulnerability assessments and penetration testing results. Ensure findings are addressed and remediated promptly.

  • Reporting & Documentation:
    Prepare detailed reports and documentation for internal teams and stakeholders on security incidents, trends, and recommendations for improvement.

  • Continuous Improvement:
    Participate in the development of use cases, detection rules, and SOC playbooks. Provide feedback to enhance detection mechanisms and response processes.

Required Skills & Qualifications:

  • Experience:

    • 3+ years of experience in a SOC environment as an L2 Analyst or equivalent.
    • Hands-on experience with IBM QRadar SIEM is mandatory.
    • Experience in handling escalated security incidents and threat investigations.
  • Technical Expertise:

    • Strong understanding of network protocols, security architecture, firewalls, IDS/IPS, and endpoint protection.
    • Proficient in threat analysis, malware detection, and forensics.
    • Knowledge of common attack vectors, threat actors, and methods of exploitation (e.g., phishing, malware, DDoS, etc.).
  • Certifications (preferred):

    • Certified Information Systems Security Professional (CISSP)
    • Certified Ethical Hacker (CEH)
    • Certified SOC Analyst (CSA)
    • QRadar Certification (preferred)

Halian Group

With over 20 years of experience, we have come to understand that innovation is the only way to provide agile, practical solutions that transform businesses and careers. Our resourcing and smart services help you to realize tomorrow’s potential. Discover the amazing things possible when you bring the right people and the right technologies together.


#L1-KW1