Job Detail
-
Job ID 5685
-
Experience 5 Years
-
Gender Male
-
Qualifications Degree Bachelor
Job Description
Experience Required: Minimum 5 years as a SOC Analyst
Job Overview:
We are looking for an experienced and highly skilled SOC Analyst L3 to join our 24×7 Security Operations Center (SOC) team in Saudi Arabia. The ideal candidate will have at least 5 years of experience as a SOC Analyst, with a strong background in creating playbooks on multiple SIEM and SOAR platforms, including opensource tools like Elastic and Red Hat Ansible. Additionally, the candidate should have experience in administering SIEM and SOAR platforms and be comfortable working in shifts and on public holidays.
Key Responsibilities:
- Lead the monitoring and analysis of security events and incidents using advanced SIEM tools, including LogRhythm and opensource platforms like Elastic.
- Create and maintain detailed incident response playbooks for multiple SIEM and SOAR platforms, ensuring efficient and effective incident handling.
- Develop and manage automation workflows on SOAR platforms to streamline and enhance incident response processes.
- Perform advanced threat hunting and incident analysis to identify and mitigate potential security incidents.
- Administer and maintain SIEM and SOAR platforms, including tasks such as:
- Configuring and tuning SIEM and SOAR systems for optimal performance.
- Integrating new data sources and ensuring proper log ingestion.
- Managing user accounts, roles, and permissions.
- Performing regular system updates and patch management.
- Monitoring system health and performance, and troubleshooting issues.
- Conducting regular backups and ensuring disaster recovery readiness.
- Provide mentorship and guidance to junior SOC analysts and contribute to their development.
- Collaborate with other teams to enhance overall security posture and incident response capabilities.
- Be available to work in shifts and on public holidays as part of a 24×7 SOC team.
Qualifications:
- Bachelor’s degree in Computer Science, Information Security, or a related field.
- Minimum of 5 years of experience as a SOC Analyst.
- Extensive experience with LogRhythm, Elastic, and other SIEM tools.
- Proven experience in creating and maintaining playbooks on multiple SIEM and SOAR platforms, including opensource tools like Elastic and Red Hat Ansible.
- Strong understanding of cybersecurity principles, including threat detection, incident response, and vulnerability management.
- Excellent analytical and problem solving skills.
- Strong communication and leadership skills.
- Relevant certifications such as CISSP, CEH, GIAC, or similar are highly desirable.
Preferred Skills:
- Experience with network security monitoring and analysis.
- Knowledge of common threat vectors and attack methods.
- Understanding of regulatory requirements and industry standards related to information security.
- Ability to work in a fast paced and dynamic environment.
What We Offer:
- Competitive salary and benefits package.
- Opportunities for professional growth and development.
- A collaborative and supportive work environment.
- Exposure to the latest security technologies and practices.