L2 SOC Analyst at CCDS
Riyadh, Riyadh Region, Saudi Arabia -
Full Time


Start Date

Immediate

Expiry Date

08 Feb, 26

Salary

0.0

Posted On

10 Nov, 25

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Advanced Networking Knowledge, Operating System Proficiency, Security Tools Expertise, Threat Analysis, Advanced Log Analysis, Scripting Skills, Incident Response, Analytical Skills, Problem-Solving Skills, Communication Skills, Mentoring Capabilities, Time Management, Resilience, Adaptability, Confidentiality, Ethical Practices

Industry

Information Technology & Services

Description
CCDS is at the forefront of information technology and cybersecurity solutions, and we are seeking a skilled SOC Analyst L2 to enhance our dynamic team. In this pivotal role, you will oversee and manage security incidents while leveraging your expertise to support the Level 1 Analysts. You will conduct in-depth analyses of security threats and incidents, providing mentorship to junior analysts and contributing to the continuous improvement of our security posture. Responsibilities Incident Management: Lead the investigation of security incidents escalated from Level 1 analysts, determining the root cause and impact, and recommending remediation actions. Ensure timely response and resolution of security incidents in accordance with established procedures and best practices. Document security incidents, actions taken, and lessons learned to improve incident response processes. Threat Intelligence and Analysis: Analyze threat data and intelligence to identify vulnerabilities and recommend security improvements. Stay up-to-date on the latest cyber threats, trends, and emerging technologies. Mentorship and Training: Provide guidance and mentorship to Level 1 analysts, helping them to improve their analytical skills and technical knowledge. Assist in developing training materials and conducting training sessions for the SOC team. Collaboration: Collaborate with IT teams to remediate vulnerabilities and strengthen the organization’s security posture. Work with external partners and vendors to enhance security monitoring and incident response capabilities. Reporting: Prepare regular reports on security incidents, trends, and performance metrics to share with management and stakeholders. Contribute to the development and continuous improvement of the SOC’s standard operating procedures. Saudi Nationality is mandatory. Technical Skills: Advanced Networking Knowledge: In-depth understanding of TCP/IP, DNS, DHCP, and network security concepts. Operating System Proficiency: Strong knowledge of Windows, Linux, and Unix operating systems. Security Tools Expertise: Proficient with SIEM platforms, IDS/IPS, firewalls, endpoint protection solutions, and vulnerability assessment tools. Threat Analysis: Ability to analyze complex security events and incidents to identify threats. Advanced Log Analysis: Experience interpreting logs from various systems, applications, and security appliances. Scripting Skills (Preferred): Proficiency in scripting languages such as Python, PowerShell, or Bash for automation tasks. Incident Response: Experience in handling security incidents and familiarity with incident response frameworks. Analytical and Problem-Solving Skills: Strong analytical skills to assess and respond to security incidents. Ability to identify patterns and trends in security data to enhance threat detection. Proficient in critical thinking and detail-oriented investigations. Communication Skills: Excellent verbal and written communication skills for incident reporting and documentation. Capability to convey complex security concepts effectively to both technical and non-technical stakeholders. Active listening skills to accurately assess and address security concerns. Other Essential Skills: Strong mentoring capabilities and a collaborative mindset. Proficient time management and ability to handle multiple tasks effectively. Resilience in high-pressure environments and adaptability to dynamic situations. Commitment to professional development and continuous improvement. Strict adherence to confidentiality and ethical practices. Required Qualifications: Educational Background: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field. Certifications (Preferred): Certified Information Systems Security Professional (CISSP) Certified Incident Handler (GCIH) Security+ or equivalent cybersecurity certifications. Experience: 3-5 years of experience in a Security Operations Center in an L2 role. Previous experience in incident response and threat hunting is highly desirable. Work Environment: Work is typically performed in an office environment with the possibility of remote work. Must be willing to work in rotational shifts that may include weekends and holidays. Private Family Health Insurance Class A Paid Time Off Training & Development Plan Performance Bonus GOSI will be covered as labor law. Hardship allowance for working during Ramadan & Public Holidays.
Responsibilities
The L2 SOC Analyst will lead the investigation of security incidents and ensure timely response and resolution. They will also provide mentorship to junior analysts and contribute to the continuous improvement of the organization's security posture.
Loading...