Our Culture : At Hulool Zaintech for Information Technology, we are proud of our culture and how it drives everything we do. We seek individuals who share our values and want to be part of a unique, engaging culture centered around collaboration and innovation. If you are looking for a role where you can enhance engagement and excellence across teams through commitment and collaboration, and are customer-centric with a focus on integrity and employee engagement, then read on to learn how you can join the Hulool Zaintech family. Our Code of Conduct : We strictly adhere to our code of conduct, which serves as a moral compass, providing a framework for responsible behavior and ethical decision-making. It outlines policies, standards, and procedures for our global operations, promoting integrity and ethical excellence across all countries we operate in. All employees review, understand, and adhere to this code annually, including new hires during onboarding. Duties and Responsibilities : Manage, configure, test, and integrate the SIEM system, focusing on content development such as reports, dashboards, real-time rules, filters, and channels. Develop and deploy new content (use-cases) on SIEM solutions based on business or threat requirements, with the engineering team's support. Conduct breach and investigative analysis to trace activities related to advanced threats. Investigate and escalate complex or high-severity security threats or incidents. Serve as an escalation resource and mentor for other analysts. Collaborate with SIEM engineering and security partners to develop and refine correlation rules. Maintain expertise in advanced persistent threats, forensics, and incident response practices. Perform threat hunting to identify emerging threat activities across internal and external sources. Coordinate evidence gathering, documentation, and review security incident reports. Assist in defining and driving strategic security initiatives. Create and develop SOC processes and procedures in collaboration with Level 1 and Level 2 analysts. Recommend improvements to security policies, procedures, and architecture based on operational insights. Develop operational and executive reports. Analyze security events to verify incidents, assessing their impact and risk to clients. Prepare incident analysis reports and coordinate responses with relevant teams. Support log integration activities and reduce false positives. Assist during incident containment, investigation, eradication, and recovery phases. Provide data support for SOC reports and metrics. Monitor for false positives and work with engineering to address them. Analyze recurring incidents and system performance, implementing corrective actions. Document and update playbooks and procedures. Minimum Requirements : 5+ years of experience in SOC operations, monitoring, and event analysis. Expertise in security monitoring and analysis platforms and related technologies. Excellent analytical and problem-solving skills. Advanced knowledge of SIEM / SOAR technologies for event investigation. Strong understanding of incident handling and response techniques. Extensive experience in incident response, handling, and security operations.
#J-18808-Ljbffr
Senior Analyst Saudi • Riyadh, Saudi Arabia