Enable job alerts via email!

Cyber Security Analyst

MIGRATIONIT

Riyadh

On-site

SAR 150,000 - 200,000

Full time

Today
Be an early applicant

Job summary

A leading IT security firm in Saudi Arabia is seeking an experienced incident response professional to investigate escalated security incidents, perform analysis, and implement containment strategies. The ideal candidate should hold a Bachelor's in Computer Science and have at least 3 years of experience in incident handling along with strong analytical skills. Professional certifications are preferred.

Qualifications

  • Bachelor's degree in Computer Science, Information Security, or related field.
  • Fluent in English language.
  • Extensive experience in incident handling and reporting (at least 3 years).
  • Strong analytical and problem-solving skills.
  • Knowledge of network security zones and Firewall configurations.
  • Experience with Systems Administration and Network Security tools.

Responsibilities

  • Provide investigation for escalated security incidents.
  • Communicate and escalate incidents per the CSIRT guidelines.
  • Conduct forensics analysis and investigation.
  • Hunt for suspicious anomalous activity.
  • Perform analysis of log files to triage security threats.

Skills

Incident handling and reporting
Analytical skills
Problem-solving skills
Knowledge of network security
Fluent in English
Experience with security assessment tools

Education

Bachelor's degree in Computer Science
Certifications related to incident response

Tools

NMAP
Nessus
Metasploit
Netcat
Log search tools
Job description
Responsibilities
  • Provide investigation for escalated security incidents.
  • Check for false positive & duplicates.
  • Provide communication and escalation throughout the incident per the CSIRT guidelines.
  • Communicates directly with data asset owners and business response plan owners during high severity incidents.
  • Hunting for suspicious anomalous activity based on data alerts or data outputs from various toolsets.
  • Perform analysis of log files to collect more contextual information in order to triage the security threat.
  • Provide forensics analysis and investigation.
  • Drives containment strategy during data loss or breach events.
  • Triage and resolve advanced vector attacks such as botnets and advanced persistent threats (APTs).
  • Works directly with data asset owners and business response plan owners during high severity incidents.
  • Provide tuning recommendations to administrators based on findings during investigations or threat information reviews.
  • Collect contextual information and pursue technical root cause analysis and attack method analysis.
  • Make content determination to treat the alert as a security incident and assign a severity level.
Requirements
  • Bachelor's degree in Computer Science, Information Security, or related field.
  • Fluent in English language.
  • The candidate must have extensive experience in incident handling and reporting (at least 3 years in a similar role). Professional certifications related to incident response is preferable.
  • Strong analytical and problem-solving skills. Knowledge of network security zones, Firewall configurations, IDS policies.
  • Knowledge of systems communications from Layer 1 to 7.
  • Experience with Systems Administration, Middleware, and Application Administration.
  • Experience with Network and Network Security tools administration.
  • In-depth experience with log search tools and usage of regular expressions.
  • In-depth knowledge of packet capture and analysis.
  • Experience with Security Assessment tools (NMAP, Nessus, Metasploit, Netcat).
  • Ability to create a containment strategy and execute it.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.