Job Search and Career Advice Platform

Enable job alerts via email!

Cybersecurity Operations Center

Tamkeen Technologies

Saudi Arabia

On-site

SAR 187,000 - 263,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity service provider in Saudi Arabia is seeking an experienced cybersecurity professional to lead incident response efforts and conduct advanced threat analysis. The ideal candidate will have over 5 years of experience in a SOC and possess a bachelor’s degree in Computer Science or a related field. Responsibilities include mentoring junior analysts, providing cybersecurity consulting, and managing security incidents. This role requires strong leadership, analytical, and communication skills, along with proficiency in using modern security tools.

Qualifications

  • Bachelor’s degree in a relevant field is typically required.
  • Hold one or more cybersecurity certifications like GCFA, GCIA, GCIH, GREM.
  • Minimum of 5 years of experience in a cybersecurity role, preferably in a SOC.

Responsibilities

  • Lead and coordinate response to security incidents, guiding SOC analysts.
  • Conduct advanced threat analysis and provide actionable recommendations.
  • Hunt for advanced threats within client networks.
  • Perform digital forensics and memory analysis.
  • Mentor junior cybersecurity analysts and strengthen their skills.

Skills

Incident response leadership
Threat hunting
Digital forensics
Malware analysis
Cybersecurity consulting
Networking concepts
Scripting and programming
Team management
Analytical skills
Communication skills

Education

Bachelor’s degree in Computer Science, Cybersecurity, or a related field

Tools

SIEM
IDS/IPS
Firewalls
EDR
Job description
Responsibilities
  • Lead and coordinate the response to critical and complex security incidents, guiding SOC L1 and L2 analysts during investigations.
  • Conduct advanced incident analysis and provide actionable recommendations for incident containment.
  • Proactively hunt for advanced threats, APTs, and sophisticated attack patterns within client networks.
  • Perform in-depth cyber threat analysis to understand attack vectors and tactics, techniques, and procedures (TTPs) used by threat actors.
  • Conduct advanced digital forensics and memory analysis to identify root causes and perform post-incident investigations.
  • Perform detailed malware analysis and reverse engineering to understand malware behavior and capabilities.
  • Integrate threat intelligence from various sources into the MSSP’s security operations to improve threat detection and response effectiveness.
  • Collaborate with threat intelligence teams to enhance the MSSP’s threat intelligence capabilities.
  • Develop and update incident response playbooks and standard operating procedures (SOPs) to address emerging threats.
  • Provide cybersecurity consulting and advisory services to clients, offering strategic guidance on security best practices and risk management.
  • Act as a primary point of contact for key clients, ensuring effective communication and a clear understanding of their security needs.
  • Build strong relationships with clients by understanding their business goals and aligning MSSP services accordingly.
  • Establish and track key SOC performance metrics, incident trends, and key performance indicators (KPIs).
  • Provide regular reports to MSSP management, clients, and stakeholders.
  • Provide strong leadership to SOC L1 and L2 analysts, fostering a collaborative and high-performing team environment.
  • Mentor junior analysts, guiding their career development and enhancing their technical skills.
  • Collaborate with internal MSSP teams such as threat intelligence, threat hunting, and engineering to enhance overall client security posture.
Technical Skills
  • In-depth knowledge of networking concepts, TCP/IP, network protocols, security architecture, and modern security technologies.
  • Proficiency in using SIEM, IDS/IPS, firewalls, EDR, and other security tools.
  • Advanced skills in scripting and programming languages for automation and analysis.
  • Strong analytical skills to investigate complex security incidents and devise effective solutions.
  • Excellent verbal and written communication skills to document incidents, write reports, and interact with team members, stakeholders, and clients.
  • Previous experience in leading and managing a team of cybersecurity professionals.
  • Deep understanding of threat intelligence sources, threat actors, and advanced cyber-attack techniques.
  • Proven experience in leading incident response efforts for complex incidents.
  • Strong experience in digital forensics, memory analysis, and advanced malware analysis.
Qualifications
  • Education: Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or a related field is typically required.
  • Certifications: Hold one or more certifications such as, GCFA, GCIA, GCIH, GREM.
  • Experience: Minimum of 5 years or more of progressive experience in a cybersecurity role, with extensive hands-on experience in a SOC environment.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.