Job Search and Career Advice Platform

Enable job alerts via email!

Specialist II, Information Security

ARO Drilling

Al Khobar

On-site

SAR 200,000 - 300,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading drilling company is seeking a Cybersecurity Specialist to manage SOC operations, ensure effective threat handling, and lead penetration testing efforts. The ideal candidate will have 6-8 years of experience in information security, a bachelor's degree in a relevant field, and proficiency in tools like Microsoft Defender XDR and forensic suites. Key responsibilities include threat intelligence management, vulnerability management, and incident response preparedness, with a focus on compliance with industry standards.

Qualifications

  • 6-8 years of relevant working experience in Information Security (Specialist II level).
  • Deep proficiency in Microsoft Defender XDR, KQL, and YARA.
  • Hands-on experience with forensic suites (EnCase or similar).
  • Mastery of Pentesting tools.

Responsibilities

  • Manage SOC Service Provider, ensuring effective alert handling, KPI maintenance, and SLA compliance.
  • Administer and utilize threat intelligence platforms to analyze external threat data.
  • Plan and execute internal penetration testing to identify security weaknesses.
  • Conduct monthly threat hunting missions based on Pentest findings.
  • Act as the technical lead for forensic investigations using forensic tools.
  • Automate delivery of high-fidelity Indicators of Compromise into the security stack.

Skills

Offensive Mindset
Forensic Analysis
Vulnerability Prioritization
Crisis Leadership

Education

Bachelor’s degree in Cybersecurity, Information Security, computer science or a related IT domain

Tools

Microsoft Defender XDR
KQL
YARA
Nessus
Qualys
Kali Linux
Metasploit
Burp Suite
Nmap
Cobalt Strike
Job description
Duties and Responsibilities
  • SOC & Vendor Management: Manage the SOC Service Provider, ensuring effective alert handling, KPI maintenance, and SLA compliance. Act as the primary technical point of contact for service tuning and escalation.
  • Threat Intelligence Management: Administer and utilize or other well-known TIPs (e.g., Microsoft Defender Threat Intelligence (MDTI), Recorded Future) to aggregate, correlate, and analyze external threat data and actor infrastructure.
  • Penetration Testing & Offensive Security: Plan and execute internal Penetration Testing (Network, Web App, and Wireless) to identify security weaknesses. Conduct regular "Red Team" style simulations to validate the effectiveness of the SOC's detection capabilities.
  • Proactive Threat Defense: Conduct monthly threat hunting missions based on Pentest findings. Develop and deploy YARA rules to identify custom malware and "living-off-the-land" binaries across the environment.
  • Digital Forensics: Act as the technical lead for forensic investigations. Utilize forensic tools such as (e.g., EnCase, FTK) to perform disk and memory analysis, ensuring proper chain of custody and evidence preservation.
  • Operationalizing Intelligence: Automate the delivery of high-fidelity Indicators of Compromise (IOCs) into the security stack. Translate CTI and Pentest findings into custom KQL detection rules and YARA signatures.
  • Vulnerability Management: Manage the vulnerability management lifecycle using (e.g., Microsoft Defender Vulnerability Management, Nessus, and Qualys). Responsibilities include periodic scanning, risk-based prioritization, and rigorous documentation of remediation actions.
  • Incident Response & Readiness: Lead as the primary Incident Handler for breaches. Plan and perform regular IR dry runs (Tabletops and Technical Drills) to validate playbooks and restore security requirements effectively.
  • Compliance & Documentation: Document configuration procedures, operational processes, and incident reports in line with GRC guidance, ISO 27001, and NCA recommendations.
  • Infrastructure Oversight: Ensure security robustness for IT systems, including AD, DNS enhancement, and logical/physical access controls.
Qualifications & Experience
  • Education: Bachelor’s degree in Cybersecurity, Information Security, computer science or a related IT domain
  • Experience: 6–8 years of relevant working experience in Information Security (Specialist II level)
  • Technical Knowledge: Deep proficiency in Microsoft Defender XDR, KQL, and YARA
  • Expertise: in Nessus and Qualys vulnerability platforms
  • Forensics: Hands-on experience with forensic suites (EnCase or similar)
  • Pentesting Tools: Mastery of Pentesting tools (e.g., Kali Linux, Metasploit, Burp Suite, Nmap, Cobalt Strike)
  • Compliance: Familiarity with ARAMCO security standards and NCA regulations
  • Certifications:
  • Required: Certified CISSP, OSCP (Offensive Security Certified Professional), GPEN (GIAC Penetration Tester), or EnCE (EnCase Certified Examiner)
Skills
  • Offensive Mindset: Ability to think like an adversary to conduct effective Penetration Testing and bridge gaps between "red" and "blue" teams
  • Forensic Analysis: Ability to conduct deep-dive host and network forensics to reconstruct attacker timeline
  • Vulnerability Prioritization: Ability to look beyond CVSS scores to prioritize patching based on real-world exploitability and business impact
  • Crisis Leadership: Ability to manage multiple incidents and lead technical teams in a high-pressure environment

Note: This description preserves the structure and content of the original while improving formatting and readability. It does not add new roles or alter stated requirements.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.