Qureos

FIND_THE_RIGHTJOB.

Cyber Security Operation Analyst (Qatari & children of Qatari mother)

Doha, Qatar

Job Summary

  • Creation of USE cases using MITRE framework, Dashboard and Reports on Splunk SIEM
  • Strong technical background on Network Security, Threat hunting and Risk based analysis
  • Analyzing Network traffic for IPS, WAF, Firewall, DDOS and other perimeter device.

Key Accountabilities

  • Continuous monitoring and review of security events, reports, alerts and CSOC dashboards to identify anomalous patterns indicative of potential security incidents
  • Responsible for timely and effective response to, and management of, incidents, events, notifications, calls and other activities related to CSOC including Root Cause Analysis
  • Gather relevant information and provide actionable intelligence on potential cyber security threats and incidents

Other Accountabilities

  • Take direction and guidance from InfoSec Management to build, support and update the CSOC playbooks/processes
  • Render support for the administration and configuration of security controls such as SIEM, Anti-virus software, network security devices, PAM, DLP, Vulnerability Management, etc.
  • Prepare security awareness messages, presentations and announcements for management, IT staff, and regular users
  • Participate in regular cyber drills and CSOC exercises

Key Interactions

Competencies

  • Adaptability/Flexibility
  • Computer Skills
  • Creativity/Innovation
  • Decision Making/Judgment
  • Dependability
  • Initiative
  • Integrity/Ethics
  • Internet Savvy
  • Managing Technology
  • Personal Organization
  • Planning
  • Problem Solving/Analysis
  • Process PRIME postings manually
  • Process transaction vouchers received from various Departments (internal)
  • Productivity
  • Quality
  • Receipt and verify the posting and payroll documents received
  • Results Focus
  • Self Development
  • Sense of Urgency
  • Strategic Thinking/Management
  • Summary
  • Technical Skills
  • Vision and Values

Skills

  • Anomaly Detection
  • Authentication
  • Cryptography
  • Cyber Crime Trend Analysis
  • Cyber Security Administration
  • Cyber Security Analysis
  • Cyber Security Architecture
  • Cyber Security Audits
  • Cyber Security Best Practices
  • Cyber Security Compliance
  • Cyber Security Design
  • Cyber Security Governance
  • Cyber Security Monitoring
  • Cyber Security Planning
  • Cyber Security Policy Management
  • Cyber Security Regulations
  • Cyber Security Risk Management
  • Cyber Security Standards and Procedures
  • Cyber Security Testing
  • Cyber Security Threat Monitoring
  • Cyber Security Tools/Products
  • Cyber Threats and Attacks
  • Data Analysis
  • Disaster Recovery
  • Encryption and Authentication
  • Encryption/Decryption
  • Event Monitoring/Log Analysis
  • Fault Diagnosis/Isolation/Detection
  • Firewall Management
  • Hacking Countermeasures
  • Incident Response
  • Incidents Reporting
  • Intrusion Detection
  • Intrusion Detection Systems
  • Malware Analysis
  • Network Forensics
  • Network Protocols
  • Network Topologies
  • Penetration Testing
  • Threat Containment
  • Vulnerability Assessments

Education

  • Bachelor’s degree in Computer Science or equivalent

© 2025 Qureos. All rights reserved.