Description:
Threat Hunting: Proactively identify IOCs and APTs using SIEM, EDR, and advanced tools. Develop and refine hunting methodologies.
Threat Intelligence: Analyze internal/external threat data, monitor OSINT/dark web, and create actionable intelligence reports.
Incident Response: Lead containment, eradication, and recovery efforts. Conduct RCA and maintain incident response playbooks.
SOC Operations: Monitor alerts, perform vulnerability assessments, and mentor L1 analysts.
Qualifications:
4+ years in a SOC with focus on threat hunting, intelligence, and incident response.
Hands-on experience with SIEM (e.g., Splunk, QRadar) and EDR tools.
Certifications like CTIA, GCIH, CISSP, or CEH preferred.
Strong knowledge of network protocols, OS, and cloud security.
Scripting skills (Python, PowerShell) for automation.
Preferred Skills:
MITRE ATT&CK framework application.
Knowledge of GDPR, HIPAA, or PCI-DSS.
Shift flexibility for 24/7 SOC operations.
Organization | Flint International |
Industry | Management Jobs |
Occupational Category | SOC Analyst |
Job Location | Riyadh,Saudi Arabia |
Shift Type | Morning |
Job Type | Full Time |
Gender | No Preference |
Career Level | Experienced Professional |
Experience | 4 Years |
Posted at | 2025-03-05 11:11 am |
Expires on | 2025-06-03 |