Enable job alerts via email!

Cyber Security Analyst

MIGRATIONIT

Saudi Arabia

On-site

SAR 150,000 - 200,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading IT security firm in Saudi Arabia is seeking an experienced security incident handler. The candidate will be responsible for investigating escalated security incidents, ensuring communication per guidelines, and driving containment strategies during data loss. A Bachelor's degree in Computer Science and extensive experience (3+ years) in incident handling are required, along with fluency in English and familiarity with security assessment tools.

Qualifications

  • Extensive experience in incident handling and reporting (at least 3 years in a similar role).
  • Professional certifications related to incident response preferred.
  • Fluent in English.

Responsibilities

  • Provide investigation for escalated security incidents.
  • Check for false positive & duplicates.
  • Provide communication and escalation throughout the incident per the CSIRT guidelines.
  • Perform analysis of log files to collect more contextual information.
  • Drive containment strategy during data loss or breach events.

Skills

Incident handling
Analytical skills
Communication
Problem-solving
Network security knowledge
Firewall configuration
Experience with IDS policies
Log analysis
Packet capture
Security assessment tools

Education

Bachelor's degree in Computer Science

Tools

NMAP
Nessus
Metasploit
Netcat
Job description
Responsibilities
  • Provide investigation for escalated security incidents.
  • Check for false positive & duplicates.
  • Provide communication and escalation throughout the incident per the CSIRT guidelines.
  • Communicates directly with data asset owners and business response plan owners during high severity incidents.
  • Hunting for suspicious anomalous activity based on data alerts or data outputs from various toolsets.
  • Perform analysis of log files to collect more contextual information in order to triage the security threat.
  • Provide forensics analysis and investigation.
  • Drives containment strategy during data loss or breach events.
  • Triage and resolve advanced vector attacks such as botnets and advanced persistent threats (APTs).
  • Works directly with data asset owners and business response plan owners during high severity incidents.
  • Provide tuning recommendations to administrators based on findings during investigations or threat information reviews.
  • Collect contextual information and pursue technical root cause analysis and attack method analysis.
  • Make content determination to treat the alert as a security incident and assign a severity level.
Requirements
  • Bachelor's degree in Computer Science, Information Security, or related field.
  • Fluent in English language.
  • The candidate must have extensive experience in incident handling and reporting (at least 3 years in a similar role). Professional certifications related to incident response is preferable.
  • Strong analytical and problem-solving skills. Knowledge of network security zones, Firewall configurations, IDS policies.
  • Knowledge of systems communications from Layer 1 to 7.
  • Experience with Systems Administration, Middleware, and Application Administration.
  • Experience with Network and Network Security tools administration.
  • In-depth experience with log search tools and usage of regular expressions.
  • In-depth knowledge of packet capture and analysis.
  • Experience with Security Assessment tools (NMAP, Nessus, Metasploit, Netcat).
  • Ability to create a containment strategy and execute it.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.