A leading Talent Acquisition Company in Saudi Arabia is seeking a talented Cyber Defense Center Analyst to join our esteemed team in Saudi Arabia. In this critical role, you will monitor, analyze, and respond to cybersecurity incidents within an operational environment. Your expertise will help safeguard our clients’ information systems, and you will collaborate closely with other cybersecurity professionals to develop and enhance incident response strategies.
The Cyber Defense Center Analyst will utilize advanced security tools to detect, analyze, and mitigate potential threats and vulnerabilities. Responsibilities include conducting thorough investigations into incidents, preparing reports, and working with various stakeholders to improve overall security posture.
Your analytical skills and attention to detail are vital in supporting the mission of ensuring information security and defending against cyber threats.
Key Responsibilities
- Monitor security events from SIEM, tickets, email, and phone channels.
- Investigate and escalate incidents based on severity.
- Analyze cyber threat intelligence and emerging threats.
- Perform incident triage and provide remediation recommendations.
- Track and document cyber incidents.
- Support configuration and management of security monitoring tools (SIEM, NETFLOW, etc.).
- Collaborate with technical teams to enhance security systems and processes.
- Document security procedures, configurations, and incidents.
Knowledge and Skills
Knowledge of cybersecurity considerations for database systems.Knowledge of Threat Hunting and MITRE ATT&CK methodology.Knowledge of network traffic protocols, methods, and management.Knowledge of cyber threat intelligence sources and their capabilities.Proficiency in SIEM query languages for basic filtering.Scripting skills in Python and PowerShell.Experience with security tools—both commercial and open-source.Ability to conduct research using the deep web safely and effectively.Familiarity with defensive technologies such as NGFW, AV, VPN, IPS, NETFLOW, DAM, WAF, Proxy, and Web Abilities.Ability to create signature rules (e.g., Snort, Yara) and Sigma detection rules.Ability to assess the reliability, validity, and relevance of cyber threat intelligence.Cybersecurity Expertise
Deep understanding of network security architecture, defense-in-depth principles, and incident response.Bachelor's degree in Cybersecurity, Information Technology, or a related field.Strong knowledge of security concepts, technologies, and best practices.Experience in incident response, threat hunting, or security monitoring.Minimum 4 years of cybersecurity experience, including at least 2 years in SOC / SIEM operations.Knowledge of network security, incident response, and MITRE ATT&CK framework.Proficiency in SIEM, scripting (Python, PowerShell), and security tools.Familiarity with network and application security technologies such as firewalls and intrusion detection systems.Ability to work effectively under pressure and prioritize tasks.Relevant industry certifications (e.g., CySA+, CEH, eJPT, eCIR, eTHP, SOC-200).Commitment to continuous learning and staying current with cybersecurity developments.#J-18808-Ljbffr