Soc Analyst

 

Description:

Threat Hunting: Proactively identify IOCs and APTs using SIEM, EDR, and advanced tools. Develop and refine hunting methodologies.
Threat Intelligence: Analyze internal/external threat data, monitor OSINT/dark web, and create actionable intelligence reports.
Incident Response: Lead containment, eradication, and recovery efforts. Conduct RCA and maintain incident response playbooks.
SOC Operations: Monitor alerts, perform vulnerability assessments, and mentor L1 analysts.

Qualifications:

4+ years in a SOC with focus on threat hunting, intelligence, and incident response.
Hands-on experience with SIEM (e.g., Splunk, QRadar) and EDR tools.
Certifications like CTIA, GCIH, CISSP, or CEH preferred.
Strong knowledge of network protocols, OS, and cloud security.
Scripting skills (Python, PowerShell) for automation.

Preferred Skills:
MITRE ATT&CK framework application.
Knowledge of GDPR, HIPAA, or PCI-DSS.
Shift flexibility for 24/7 SOC operations.
 

Organization Flint International
Industry Management Jobs
Occupational Category SOC Analyst
Job Location Riyadh,Saudi Arabia
Shift Type Morning
Job Type Full Time
Gender No Preference
Career Level Experienced Professional
Experience 4 Years
Posted at 2025-03-05 11:11 am
Expires on 2025-06-03