Job Search and Career Advice Platform

Enable job alerts via email!

Cybersecurity Operations Center

Tamkeen Technologies

Riyad Al Khabra

On-site

SAR 240,000 - 320,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm in Saudi Arabia is seeking an experienced cybersecurity professional to lead incident response and manage SOC operations. In this role, you'll be responsible for guiding L1 and L2 analysts, conducting threat analysis, and providing strategic security consulting to clients. The ideal candidate will have a Bachelor's degree in a relevant field, at least 5 years of experience, and relevant cybersecurity certifications. This position requires strong leadership and communication skills to enhance overall client security posture.

Qualifications

  • Bachelor’s degree in Computer Science, Cybersecurity, Information Technology or a related field.
  • Hold one or more certifications such as GCFA, GCIA, GCIH, GREM.
  • Minimum of 5 years or more of progressive experience in a cybersecurity role.

Responsibilities

  • Lead and coordinate response to security incidents.
  • Conduct advanced incident analysis and provide recommendations.
  • Proactively hunt for advanced threats within client networks.

Skills

Networking concepts
SIEM tools
Scripting and programming
Analytical skills
Team leadership
Digital forensics

Education

Bachelor’s degree in Computer Science or Cybersecurity

Tools

SIEM
IDS/IPs
EDR
Job description
Roles and Responsibilities
  • Lead and coordinate the response to critical and complex security incidents, guiding SOC L1 and L2 analysts during investigations.
  • Conduct advanced incident analysis and provide actionable recommendations for incident containment.
  • Proactively hunt for advanced threats, APTs, and sophisticated attack patterns within client networks.
  • Perform in-depth cyber threat analysis to understand attack vectors and tactics, techniques, and procedures (TTPs) used by threat actors.
  • Conduct advanced digital forensics and memory analysis to identify root causes and perform post-incident investigations.
  • Perform detailed malware analysis and reverse engineering to understand malware behavior and capabilities.
  • Integrate threat intelligence from various sources into the MSSP’s security operations to improve threat detection and response effectiveness.
  • Collaborate with threat intelligence teams to enhance the MSSP’s threat intelligence capabilities.
  • Develop and update incident response playbooks and standard operating procedures (SOPs) to address emerging threats.
  • Provide cybersecurity consulting and advisory services to clients, offering strategic guidance on security best practices and risk management.
  • Act as a primary point of contact for key clients, ensuring effective communication and a clear understanding of their security needs.
  • Build strong relationships with clients by understanding their business goals and aligning MSSP services accordingly.
  • Establish and track key SOC performance metrics, incident trends, and key performance indicators (KPIs).
  • Provide regular reports to MSSP management, clients, and stakeholders.
  • Provide strong leadership to SOC L1 and L2 analysts, fostering a collaborative and high-performing team environment.
  • Mentor junior analysts, guiding their career development and enhancing their technical skills.
  • Collaborate with internal MSSP teams such as threat intelligence, threat hunting, and engineering to enhance overall client security posture.
Technical Skills
  • In-depth knowledge of networking concepts, TCP / IP, network protocols, security architecture, and modern security technologies.
  • Proficiency in using SIEM, IDS / IPS, firewalls, EDR, and other security tools.
  • Advanced skills in scripting and programming languages for automation and analysis.
  • Strong analytical skills to investigate complex security incidents and devise effective solutions.
  • Excellent verbal and written communication skills to document incidents, write reports, and interact with team members, stakeholders, and clients.
  • Previous experience in leading and managing a team of cybersecurity professionals.
  • Deep understanding of threat intelligence sources, threat actors, and advanced cyber-attack techniques. Proven experience in leading incident response efforts for complex incidents.
  • Strong experience in digital forensics, memory analysis, and advanced malware analysis.
Qualifications

Education: Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or a related field is typically required.

Certifications: Hold one or more certifications such as GCFA, GCIA, GCIH, GREM.

Experience: Minimum of 5 years or more of progressive experience in a cybersecurity role, with extensive hands‑on experience in a SOC environment.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.