Job Search and Career Advice Platform

Enable job alerts via email!

SOC Lead

Takamol Holding

Riyadh

On-site

SAR 150,000 - 200,000

Full time

2 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm in Saudi Arabia seeks an experienced professional to lead SOC operations. Key responsibilities include advanced monitoring of security events and conducting proactive threat hunting. The ideal candidate should have a Bachelor’s in a relevant field and a strong background in cybersecurity with at least 4.5 years of experience. Excellent communication skills and leadership capabilities are essential. Join us and help strengthen our cybersecurity posture through effective incident handling and team mentorship.

Qualifications

  • 4.5 - 6.5 years of experience in cybersecurity, with at least 3 years in SOC leadership roles.
  • Strong knowledge of regulatory frameworks (GDPR, PCI-DSS, HIPAA).
  • Experience with malware analysis and digital forensics.

Responsibilities

  • Lead monitoring of security events across platforms.
  • Conduct threat hunting using MITRE ATT&CK.
  • Mentor SOC analysts to improve their skills.

Skills

Strong analytical and problem-solving
Excellent written and verbal communication
Leadership and mentoring capabilities
Hands-on experience with SIEM platforms
Familiarity with scripting/automation

Education

Bachelor’s degree in computer science or related field

Tools

SIEM platforms (Splunk, QRadar, ArcSight)
EDR, Proxy, Firewalls, IPS
Job description
Job Responsibilities
  • Lead advanced monitoring of security events, logs, and alerts across multiple platforms (SIEM, EDR, Firewalls, Azure, etc.).
  • Develop and fine-tune detection use cases, correlation rules, and dashboards.
  • Conduct proactive threat hunting using MITRE ATT&CK and threat intelligence sources.
  • Conduct deep-dive investigations into suspicious activities, malware infections, lateral movements, and APT-style threats across Endpoints, Network, Linux and Windows servers, performing root cause analysis (RCA) to identify underlying vulnerabilities and recommend remediation actions.
  • Lead containment, eradication, and recovery efforts for high-severity incidents.
  • Conduct forensic analysis of compromised endpoints, servers, and network devices.
  • Correlate threat intel with internal and external telemetry to detect emerging threats.
  • Provide recommendations to strengthen detection and response based on global threat trends.
  • Share intelligence reports with leadership and stakeholders.
  • SOC Operations & Process Improvement
  • Mentor and train SOC analysts (L1/L2) to improve technical and analytical skills.
  • Develop playbooks, runbooks, and escalation procedures for effective incident handling.
  • Collaborate with IT, Cloud, and GRC teams to ensure compliance with security standards.
  • Governance, Risk & Compliance Support
  • Ensure SOC processes align with regulatory requirements and industry best practices.
  • Support audit, compliance, and reporting activities with accurate incident records and metrics.
Qualifications & Experience
  • Education: Bachelor’s degree in computer science, Cybersecurity, Information Security, or related field.
  • Experience: (4.5 - 6.5) years in cybersecurity, with at least 3 years in SOC or DFIR leadership roles.
  • Technical Expertise:
    • Hands-on experience with SIEM platforms (Splunk, QRadar, ArcSight).
    • Strong knowledge of EDR, Proxy, Firewalls, IPS, DLP, and cloud-native security tools.
    • Experience with malware analysis, digital forensics, and reverse engineering.
    • Familiarity with scripting/automation (Python, PowerShell, Bash).
  • Frameworks & Standards:
    • Deep understanding of MITRE ATT&CK, Cyber Kill Chain, Diamond Model.
    • Knowledge of regulatory frameworks (GDPR, PCI-DSS, HIPAA, NCA).
  • Professional Certifications (preferred):
    • GCIA, GMON, GSOM, GCIH, GCFA.
  • Other requirements:
    • Strong analytical and problem-solving skills.
    • Ability to work under pressure in high-severity incidents.
    • Excellent written and verbal communication for both technical and executive audiences.
    • Leadership and mentoring capabilities for SOC teams.
    • Strong collaboration with cross-functional IT and business units.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.