Job Search and Career Advice Platform

Enable job alerts via email!

Cyber Security Engineer

NextEra

Dhahran Compound

On-site

SAR 200,000 - 300,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading energy company is seeking a Cyber Defense professional in Dhahran Compound, Saudi Arabia. You will oversee threat detection and incident response, enhance SIEM and EDR use cases, and manage security tools and policies. Candidates should have over 7 years in security operations with a Bachelor's in Computer Science. Strong communication skills and preferred experience in KSA sector requirements are advantageous. Join to make a proactive impact in a dynamic environment.

Qualifications

  • 7+ years experience in security operations including incident response.
  • Strong SIEM content creation, endpoint forensics, and network analysis.
  • Bachelor’s degree in Computer Science or equivalent.

Responsibilities

  • Lead hands-on threat detection and incident response.
  • Perform hypothesis-driven threat hunting using SIEM/EDR.
  • Own security configuration baselines and hardening tools.
  • Coordinate vulnerability management and audits.

Skills

Threat Detection
Incident Response
Blue-team Engineering
SIEM content creation
Endpoint Forensics
Network Analysis
Scripting (KQL, PowerShell, Python)
Communication Skills

Education

Bachelor’s in Computer Science

Tools

Microsoft Sentinel
Splunk
CrowdStrike
Palo Alto Firewalls
Azure Defender
Job description
Overview

Dear All, NextEra looking for an experienced Cyber Defense professional to strengthen our enterprise detection, response, and hardening capabilities. You will lead hands‑on threat detection and incident response, mature SIEM/EDR/SOAR use‑cases, and drive proactive hardening across endpoints, networks, and cloud workloads. The ideal hire has deep blue‑team expertise, can hunt across complex environments, and is comfortable engaging with stakeholders—from sysadmins to business leaders.

Responsibilities
  • Threat Detection & Response: Triage alerts, investigate incidents end‑to‑end, contain/eradicate threats, and lead technical post‑incident reviews. Develop and maintain playbooks aligned to MITRE ATT&CK.
  • Threat Hunting: Perform hypothesis‑driven hunts using SIEM, EDR telemetry, and network data; convert findings into new detections/use‑cases.
  • Engineering & Hardening: Own security configuration baselines (CIS/benchmarks), harden Windows/Linux/AD/O365/Azure, and validate controls via purple‑team exercises.
  • Vulnerability & Exposure Management: Coordinate scan cycles, validate exploitable risk, track remediation with owners, and verify closure against SLAs.
  • Security Tools Management: Operate and tune SIEM/EDR/SOAR/IDS/IPS, email security, WAF, and cloud‑security tooling; optimize log sources and parsers for coverage and fidelity.
  • Policy, Audit & Compliance Support: Provide technical evidence for audits; map controls and incidents to frameworks (e.g., NIST CSF, ISO 27001) and KSA‑specific requirements (e.g., NCA ECC).
  • Awareness & Enablement: Deliver targeted guidance to IT/DevOps and conduct lessons‑learned sessions after incidents to drive secure behaviors.
  • Documentation & Reporting: Maintain runbooks, detections catalog, IR timelines, and dashboards; publish weekly metrics (MTTD, MTTR, recurring root causes).

These responsibilities explicitly cover monitoring & incident response, system management, vulnerability management, policy & compliance, user awareness, documentation/reporting, and threat intelligence.

Required Qualifications
  • Experience: ~7 years in security operations / incident response / blue‑team engineering, including on‑call participation.
  • Detection & IR: Strong SIEM content creation (KQL/SPL), endpoint forensics (Windows artifacts, memory, triage), network analysis (PCAP, IDS), and incident handling.
  • Platforms & Tools (hands‑on):
  • SIEM/SOAR: Microsoft Sentinel / Splunk + SOAR (playbooks/automations)
  • EDR/XDR: Microsoft Defender for Endpoint, CrowdStrike, or similar
  • Network/Perimeter: Palo Alto / Fortinet firewalls, IDS/IPS, WAF
  • Cloud: Azure (Defender for Cloud, Entra ID, Defender for Identity), O365 security controls
  • Frameworks & Methods: MITRE ATT&CK, NIST CSF/800‑61, ISO 27001; exposure to purple‑team/ATT&CK emulations.
  • Scripting: One of KQL, PowerShell, Python for automation/content.
  • Communication: Clear incident reporting and executive‑level summaries; ability to influence remediation owners.
  • Language: English; Arabic is a plus for KSA stakeholder engagement.
Preferred/Good‑to‑Have
  • Experience operating to KSA sectoral expectations (e.g., NCA ECC; SAMA CSF if BFSI).
  • Exposure to zero‑trust principles, identity threat detection (ITDR), and SaaS security (CASB/DLP).
  • Experience integrating detections with ticketing/ITSM and CMDB for ownership and SLAs.
Education & Certifications
  • Bachelor’s in Computer Science, Information Security, or equivalent experience.

One or more relevant certifications: GCIA/GCIH/GCED/GCFA, SC‑200 / AZ‑500, CISSP, CompTIA CySA+ / Security+

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.