Enable job alerts via email!

Cybersecurity Defense Specialist

Lendo Inc

Riyadh

On-site

SAR 150,000 - 200,000

Full time

Today
Be an early applicant

Job summary

A leading technology company in Riyadh is seeking a vigilant Cybersecurity Defense Specialist. The ideal candidate will monitor security alerts, coordinate incident responses, and enhance defense strategies. A bachelor's degree in Cybersecurity or related field and 1–3 years of experience in a SOC are required. Proficient communication in Arabic and English is essential.

Qualifications

  • 1–3 years of experience in a SOC, incident response, or threat monitoring role.
  • Practical experience with malware analysis and intrusion detection.
  • Proficiency in both Arabic and English.

Responsibilities

  • Monitor and analyze security alerts daily.
  • Build and enhance security detection rules.
  • Coordinate incident response activities.
  • Conduct root cause analysis and forensic activities.
  • Develop incident response playbooks.

Skills

Security monitoring
Incident response
Communication skills
Threat analysis
Forensic investigation
Team collaboration

Education

Bachelor’s degree in Cybersecurity, Computer Science, Information Technology

Tools

SIEM platforms
Job description

As Lendo continues to expand, we’re seeking a vigilant and detail-oriented Cybersecurity Defense Specialist to help safeguard our digital assets. In this role, you’ll monitor, detect, and respond to potential threats as part of our Security Operations Center (SOC), ensuring incidents are swiftly contained and analyzed.

You’ll collaborate with cross-functional teams to enhance detection capabilities, refine response playbooks, and apply learnings from incidents to strengthen our defenses. By staying ahead of evolving threats and driving continuous improvement, you’ll play a vital role in protecting Lendo’s systems, customers, and operations.

Key Responsibilities
  • Monitor and analyze security alerts daily, performing accurate triage to determine severity, priority, and required response actions.
  • Build, tune, and enhance security detection rules and use cases across SIEM and other monitoring platforms to improve threat visibility and reduce false positives.
  • Coordinate and execute incident response activities, including containment, eradication, and recovery, while minimizing business impact.
  • Lead and support incident investigations, conduct root cause analysis, forensic activities, and preparing incident reports.
  • Conduct post-incident reviews, capturing lessons learned and ensuring continuous improvement of SOC processes and capabilities.
  • Develop, maintain, and refine incident response playbooks, escalation workflows, and an incident knowledge repository.
  • Collaborate with IT, security, and business teams to strengthen detection coverage and improve incident handling efficiency.
  • Oversee and manage relationships with Managed Security Service Providers (MSSPs), ensuring alignment with organizational security standards and SOC requirements.
  • Contribute to threat intelligence initiatives by identifying patterns, emerging threats, and potential vulnerabilities.
  • Participate in SOC readiness activities, including tabletop exercises, red team/blue team simulations, and continuous skills development.
Qualifications
  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related discipline.
  • 1–3 years of experience in a SOC, incident response, or threat monitoring role.
  • Practical experience with SIEM platforms, strong knowledge of malware analysis, intrusion detection, log analysis, and forensic investigation techniques.
  • Clear communication skills, with the ability to document incidents and brief stakeholders effectively.
  • Proficiency in Arabic and English (Writing/Speaking).
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.