Job Search and Career Advice Platform

Enable job alerts via email!

Senior SOC Analyst

Salla

Jeddah

On-site

SAR 120,000 - 150,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading technology company in Saudi Arabia is seeking a Senior SOC Analyst to oversee advanced security monitoring and incident response across various environments. The role requires extensive experience in analyzing security events and mentoring junior analysts. Ideal candidates will possess a Bachelor’s degree in Cybersecurity or a related field, along with hands-on experience with SIEM tools and cloud security practices. This position offers the chance to strengthen the organization's security posture while collaborating closely with cross-functional teams.

Qualifications

  • 5+ years of experience as a SOC Analyst (L2/L3).
  • Hands-on experience with SIEM platforms and incident response.
  • Strong knowledge of networking protocols and cloud security.

Responsibilities

  • Perform advanced L2/L3 alert triage and investigations.
  • Analyze and respond to edge security events.
  • Mentor junior SOC analysts and contribute to skill development.

Skills

Security monitoring
Incident investigation
Mentoring junior analysts
Communication skills
Networking protocols

Education

Bachelor’s degree in Cybersecurity, Information Technology, or Computer Science

Tools

SIEM platforms (Splunk, Graylog)
Cloudflare security tools
AWS security logs
Kubernetes
Job description
About the role

We are looking for a Senior SOC Analyst to lead advanced security monitoring, investigation, and response across our cloud, endpoint, network, and edge environments. This role sits at the L2/L3 level and plays a critical part in incident escalation, detection engineering, and strengthening our overall security posture. You will also act as a mentor to junior analysts and collaborate closely with security, cloud, and engineering teams.

Key responsibilities
  • Perform advanced L2/L3 alert triage and investigations across endpoint, network, cloud, and edge security platforms
  • Lead investigations using SIEM tools to validate incidents, reduce noise, and determine impact
  • Analyze and respond to edge security events including WAF, DDoS, bot activity, and Zero Trust alerts
  • Act as an escalation point for confirmed incidents and support containment and response actions
  • Conduct root cause analysis and threat investigations, identifying attacker behavior and scope of impact
  • Design, tune, and maintain detection rules and logic across SIEM platforms
  • Improve detection coverage by aligning rules with the MITRE ATT&CK framework
  • Mentor and guide junior SOC analysts and contribute to skill development across the team
  • Help build and maintain investigation playbooks and incident response runbooks
  • Collaborate with SOC leadership, Cloud Security, and DevOps teams to improve security controls and visibility
What success looks like
  • Security alerts are accurately triaged with reduced false positives and faster response times
  • Incidents are thoroughly investigated with clear root cause analysis and actionable remediation
  • Detection coverage improves continuously across cloud, endpoint, and edge environments
  • Junior analysts demonstrate stronger investigation and escalation capabilities
  • Cross-functional teams are supported with clear, timely security insights and recommendations
Qualifications
  • 5+ years of experience as a SOC Analyst (L2/L3)
  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or equivalent experience
  • Hands-on experience with SIEM platforms (Splunk, Graylog, or similar)
  • Experience performing alert triage, incident investigation, and escalation
  • Strong knowledge of networking protocols (TCP/IP, DNS, HTTP/HTTPS, BGP)
  • Experience analyzing AWS security logs (CloudTrail, CloudWatch, VPC Flow Logs)
  • Experience with container and Kubernetes runtime security (Kubernetes, Amazon EKS)
  • Hands-on experience with Cloudflare security tools (WAF, DDoS, Bot Management, Zero Trust)
  • Strong understanding of IDS/IPS, firewalls, proxies, and DLP technologies
  • Experience conducting root cause analysis and post-incident reviews
  • Familiarity with MITRE ATT&CK framework and NIST incident response standards
  • Experience developing and tuning SIEM detection rules
  • Knowledge of scripting or automation (Python, PowerShell, or Bash)
  • Foundational understanding of AI/ML security concepts and LLM-related risks
  • Strong analytical, investigation, and incident handling skills
  • Ability to communicate technical findings to non-technical stakeholders
  • Relevant certifications preferred (GCIA, GCIH, CompTIA CySA+, AWS Security Specialty)
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.