Enable job alerts via email!

SOC Analyst

Fusion Outsourcing and Services

Doha

On-site

QAR 400,000 - 600,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity service provider in Doha seeks a SOC Analyst to monitor and respond to cybersecurity threats. You will be responsible for incident response, threat intelligence analysis, and vulnerability management. Candidates should possess a Bachelor’s degree in Computer Science and have 3–5 years of relevant experience. Familiarity with SIEM tools and strong communication skills are essential. The role offers an opportunity to significantly impact cybersecurity practices in a dynamic environment.

Qualifications

  • 3–5 years handling alerts and investigations, including on-call exposure.
  • Relevant certifications may substitute for a degree for L1 roles.
  • Hands-on experience with SIEM and EDR tools.

Responsibilities

  • Continuously monitor systems, networks, and logs for threats using SIEM tools.
  • Investigate, contain, and resolve security incidents.
  • Analyze threat data and update detection rules.

Skills

Networking knowledge (IP, DNS, HTTP, TLS)
Communication skills
SIEM and EDR tools experience
Basic query writing (KQL / SPL)

Education

Bachelor’s degree in Computer Science or equivalent

Tools

QRadar
Sentinel
TrendMicro
Defender
Job description
Job Description

Job‑Specific Skills & Responsibilities

The SOC Analyst / Security Operations Specialist monitors, detects, and responds to cybersecurity threats, ensuring timely containment and mitigation of risks across enterprise systems.

Key Responsibilities
  1. Monitor & Detect

    Continuously monitor systems, networks, and logs for threats using SIEM tools.

  2. Incident Response Investigate, contain, and resolve security incidents.

    Document findings and maintain incident records according to organizational standards.

  3. Threat Intelligence

    Analyze threat data and update detection rules to address emerging risks.

  4. Vulnerability Management

    Identify, prioritize, and coordinate patching of security weaknesses.

  5. Tool Management Maintain and optimize SOC tools, including SIEM, EDR, IDS / IPS, and SOAR platforms.
  6. Reporting & Compliance

    Prepare security reports and ensure adherence to organizational policies and standards.

  7. Collaboration & Awareness

    Work with other IT and security teams to promote cybersecurity best practices.

Requirements
Minimum Qualifications
  • Bachelor’s degree in Computer Science, Information Security, IT, or equivalent hands‑on experience.
  • Relevant certifications may substitute for a degree for L1 roles.
  • Solid understanding of networking (IP, DNS, HTTP, TLS), Windows / Linux environments, cloud platforms, and security fundamentals.
  • Hands‑on experience with SIEM and EDR tools (e.g., QRadar, Sentinel; TrendMicro, Defender).
  • Ability to write basic queries (KQL / SPL) and follow incident runbooks.
  • Clear written and verbal communication skills.
Minimum Experience

L1 : 3–5 years handling alerts and investigations, including on‑call exposure.

Submission date: Please submit CVs on or before 02nd December 2025.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.