CCDS is at the forefront of information technology and cybersecurity solutions, and we are seeking a skilled SOC Analyst L2 to enhance our dynamic team. In this pivotal role, you will oversee and manage security incidents while leveraging your expertise to support the Level 1 Analysts. You will conduct in-depth analyses of security threats and incidents, providing mentorship to junior analysts and contributing to the continuous improvement of our security posture.
Responsibilities
Lead the investigation of security incidents escalated from Level 1 analysts, determining the root cause and impact, and recommending remediation actions.
Ensure timely response and resolution of security incidents in accordance with established procedures and best practices.
Document security incidents, actions taken, and lessons learned to improve incident response processes.
Analyze threat data and intelligence to identify vulnerabilities and recommend security improvements.
Stay up-to-date on the latest cyber threats, trends, and emerging technologies.
Provide guidance and mentorship to Level 1 analysts, helping them to improve their analytical skills and technical knowledge.
Assist in developing training materials and conducting training sessions for the SOC team.
Collaborate with IT teams to remediate vulnerabilities and strengthen the organization’s security posture.
Work with external partners and vendors to enhance security monitoring and incident response capabilities.
Prepare regular reports on security incidents, trends, and performance metrics to share with management and stakeholders.
Contribute to the development and continuous improvement of the SOC’s standard operating procedures.
Benefits
Private Family Health Insurance Class A
Paid Time Off
Training & Development Plan
Performance Bonus
GOSI will be covered as labor law.
Hardship allowance for working during Ramadan & Public Holidays.
Required Skills
Advanced Networking Knowledge : in-depth understanding of TCP / IP, DNS, DHCP, and network security concepts.
Operating System Proficiency : strong knowledge of Windows, Linux, and Unix operating systems.
Security Tools Expertise : proficient with SIEM platforms, IDS / IPS, firewalls, endpoint protection solutions, and vulnerability assessment tools.
Threat Analysis : ability to analyze complex security events and incidents to identify threats.
Advanced Log Analysis : experience interpreting logs from various systems, applications, and security appliances.
Scripting Skills (Preferred) : proficiency in scripting languages such as Python, PowerShell, or Bash for automation tasks.
Incident Response : experience in handling security incidents and familiarity with incident response frameworks.
Analytical and Problem-Solving Skills : strong analytical skills to assess and respond to security incidents.
Communication Skills : excellent verbal and written communication skills for incident reporting and documentation.
Additional soft skills : mentoring capabilities, collaborative mindset, time management, resilience in high‑pressure environments, adaptability, commitment to professional development, strict adherence to confidentiality and ethical practices.
Qualifications
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field.
Certifications (Preferred) : CISSP, GCIH, Security+ or equivalent cybersecurity certifications.
3‑5 years of experience in a Security Operations Center in an L2 role.
Previous experience in incident response and threat hunting is highly desirable.
Must be willing to work in rotational shifts that may include weekends and holidays.
Work is typically performed in an office environment with the possibility of remote work.
Saudi Nationality is mandatory.
#J-18808-Ljbffr
Analyst • Riyadh, Saudi Arabia