Enable job alerts via email!

Security Operation Center (SOC) Analyst L3

2P Perfect Presentation

Jeddah

On-site

SAR 150,000 - 200,000

Full time

2 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A leading cybersecurity firm seeks a SOC L3 Analyst to manage advanced incidents, conduct investigations, and implement countermeasures. The role requires a strong background in cybersecurity, with responsibilities including monitoring alerts, forensic analysis, and mentoring junior staff. Ideal candidates will have a degree in Cybersecurity or related fields, along with relevant certifications and experience in SOC operations.

Qualifications

  • 4+ years of experience in SOC Operations or related Cybersecurity roles.
  • Certifications such as eCIR, GCIH, eCDFP, or GMON are preferred.
  • Advanced proficiency in SOC tools and incident response.

Responsibilities

  • Monitor and analyze security alerts and potential incidents using various tools.
  • Lead in-depth investigations of security incidents to identify root causes.
  • Provide mentorship and support to junior SOC analysts.

Skills

Incident Response
Digital Forensics
Network Traffic Analysis
Threat Intelligence
Vulnerability Assessment

Education

Bachelor’s degree in Cybersecurity
Bachelor’s degree in Computer Science
Bachelor’s degree in IT related field

Tools

SIEM
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Network Detection And Response (NDR)

Job description

The SOC L3 Analyst plays a critical role in managing advanced cybersecurity incidents, conducting in-depth investigations, and implementing effective countermeasures to protect the organization and its clients from sophisticated threats. This role involves monitoring and analyzing security alerts, identifying root causes of incidents, and ensuring swift and effective response to mitigate risks.

Responsibilities:

Incident Handling & Response

  • Monitor and analyze security alerts and potential incidents using various tools
  • Lead in-depth investigations of security incidents to identify root causes
  • Develop and execute containment strategies to mitigate risks
  • Provide detailed incident reports with actionable insights

Tool & System Management

  • Maintain and configure firewalls, intrusion detection systems (IDS), and other security appliance
  • Operate log search tools with expertise in regular expression parsing for incident investigations
  • Ensure compliance with best practices for tool configurations and usage

Forensic & Threat Analysis

  • Analyze network traffic and packet captures to detect anomalies and malicious activities
  • Conduct in-depth investigations of alerts to identify genuine threats and reduce false positives
  • Perform digital forensics to support investigations and incident resolution
  • Leverage threat intelligence and emerging trends to enhance detection capabilities and mitigate emerging risks

Mentorship & Knowledge Sharing

  • Provide mentorship and support to junior SOC analysts
  • Document and continuously improve incident handling procedures and workflows

Requirements and Skills:

  • Bachelor’s degree in Cybersecurity, Computer Science, or IT related field.
  • 4+ years of experience in SOC Operations or related Cybersecurity roles.
  • Experience in Digital Forensics and Incident Response, including handling and investigating security incidents.
  • Certifications such as eCIR, GCIH, eCDFP, or GMON are preferred.
  • Advanced proficiency in SOC tools such as SIEM.
  • Advance Knowledge of Intrusion Detection System (IDS), Intrusion Prevention System (IPS),
  • and Network Detection And Response (NDR).
  • Familiarity with Vulnerability Assessment and Penetration Testing tools.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.