Enable job alerts via email!

SOC Analyst- L2

Innovative Solutions

Saudi Arabia

On-site

SAR 100,000 - 130,000

Full time

Today
Be an early applicant

Job summary

A leading Cybersecurity firm in Saudi Arabia is seeking a SOC Analyst - Level 2 to monitor and analyze security incidents, provide incident response, and collaborate with teams for client protection. The ideal candidate has a Bachelor's degree in Computer Science or Information Security, with 3 to 5 years of SOC experience and expertise in IDS/IPS and SIEM.

Qualifications

  • 3 to 5 years of experience in a Security Operations Center or Incident Response environment.
  • Proven ability to monitor security alerts and elevate incidents.
  • Experience in developing SIEM/SOAR use cases.

Responsibilities

  • Monitor security alerts and elevate incidents as necessary.
  • Conduct root-cause analysis and mitigation of incidents.
  • Participate in threat hunting activities.

Skills

Strong IDS/IPS knowledge
SIEM knowledge
EDR knowledge

Education

Bachelor's degree in Computer Science
Bachelor's degree in Information Security

Tools

Splunk
Security+
CEH
GCIA
GCIH
Job description

Company Description Innovative Solutions (IS) is a leading pure-player Cybersecurity company in the GCC, established in 2003 and headquartered in Riyadh, with operations in Al Khobar, Jeddah, Dubai, and Abu Dhabi. Our mission is to ‘Bring Trust to Cyberspace’ and ensure ‘Your Business, Secured.’ We offer comprehensive Cybersecurity Solutions and Services that include Advisory Services, Technical Assurance, Solution Deployment, Professional Services, and Managed Security Services.

Role Description: The SOC Analyst - Level 2 position at Innovative Solutions is a critical role within our Security Operations Center (SOC). In this role, you will be responsible for monitoring and analyzing security incidents, providing advanced incident response, and collaborating with other teams to mitigate risks to our clients’ networks and systems. You will leverage your expertise to analyze threats, investigate escalated incidents, and ensure the ongoing protection of sensitive information.

Responsibilities
  • Monitor security alerts and elevate incidents as necessary.
  • Root-cause analysis and mitigation.
  • Develop SIEM/SOAR use cases.
  • Mentor L1 analysts.
  • Advise on SOC process improvements.
  • Develop and recommend security policies and procedures based on analyses.
  • Participate in threat hunting activities and identify potential indicators of compromise (IOCs).
Qualifications
  • Bachelor's degree in Computer Science, Information Security, or a related field.
  • 3 to 5 years of experience in a Security Operations Center or Incident Response (SOC/IR) environment.
  • Strong IDS/IPS, SIEM, EDR knowledge.
  • Relevant certifications such as Security+, CEH, Splunk, GCIA, GCIH are preferred.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.