Qureos

FIND_THE_RIGHTJOB.

L2 SOC Analyst

JOB_REQUIREMENTS

Hires in

Not specified

Employment Type

Not specified

Company Location

Not specified

Salary

Not specified

CCDS is at the forefront of information technology and cybersecurity solutions, and we are seeking a skilled SOC Analyst L2 to enhance our dynamic team. In this pivotal role, you will oversee and manage security incidents while leveraging your expertise to support the Level 1 Analysts. You will conduct in-depth analyses of security threats and incidents, providing mentorship to junior analysts and contributing to the continuous improvement of our security posture.

Responsibilities

  • Incident Management:
    • Lead the investigation of security incidents escalated from Level 1 analysts, determining the root cause and impact, and recommending remediation actions.
    • Ensure timely response and resolution of security incidents in accordance with established procedures and best practices.
    • Document security incidents, actions taken, and lessons learned to improve incident response processes.
  • Threat Intelligence and Analysis:
    • Analyze threat data and intelligence to identify vulnerabilities and recommend security improvements.
    • Stay up-to-date on the latest cyber threats, trends, and emerging technologies.
  • Mentorship and Training:
    • Provide guidance and mentorship to Level 1 analysts, helping them to improve their analytical skills and technical knowledge.
    • Assist in developing training materials and conducting training sessions for the SOC team.
  • Collaboration:
    • Collaborate with IT teams to remediate vulnerabilities and strengthen the organization’s security posture.
    • Work with external partners and vendors to enhance security monitoring and incident response capabilities.
  • Reporting:
    • Prepare regular reports on security incidents, trends, and performance metrics to share with management and stakeholders.
    • Contribute to the development and continuous improvement of the SOC’s standard operating procedures.

Requirements

  • Saudi Nationality is mandatory.
  • Technical Skills:
    • Advanced Networking Knowledge: In-depth understanding of TCP/IP, DNS, DHCP, and network security concepts.
    • Operating System Proficiency: Strong knowledge of Windows, Linux, and Unix operating systems.
    • Security Tools Expertise: Proficient with SIEM platforms, IDS/IPS, firewalls, endpoint protection solutions, and vulnerability assessment tools.
    • Threat Analysis: Ability to analyze complex security events and incidents to identify threats.
    • Advanced Log Analysis: Experience interpreting logs from various systems, applications, and security appliances.
    • Scripting Skills (Preferred): Proficiency in scripting languages such as Python, PowerShell, or Bash for automation tasks.
    • Incident Response: Experience in handling security incidents and familiarity with incident response frameworks.
  • Analytical and Problem-Solving Skills:
    • Strong analytical skills to assess and respond to security incidents.
    • Ability to identify patterns and trends in security data to enhance threat detection.
    • Proficient in critical thinking and detail-oriented investigations.
  • Communication Skills:
    • Excellent verbal and written communication skills for incident reporting and documentation.
    • Capability to convey complex security concepts effectively to both technical and non-technical stakeholders.
    • Active listening skills to accurately assess and address security concerns.
  • Other Essential Skills:
    • Strong mentoring capabilities and a collaborative mindset.
    • Proficient time management and ability to handle multiple tasks effectively.
    • Resilience in high-pressure environments and adaptability to dynamic situations.
    • Commitment to professional development and continuous improvement.
    • Strict adherence to confidentiality and ethical practices.

Required Qualifications:

  • Educational Background:
    • Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field.
  • Certifications (Preferred):
    • Certified Information Systems Security Professional (CISSP)
    • Certified Incident Handler (GCIH)
    • Security+ or equivalent cybersecurity certifications.
  • Experience:
    • 3-5 years of experience in a Security Operations Center in an L2 role.
    • Previous experience in incident response and threat hunting is highly desirable.

Work Environment:

  • Work is typically performed in an office environment with the possibility of remote work.
  • Must be willing to work in rotational shifts that may include weekends and holidays.

Benefits

  • Private Family Health Insurance Class A
  • Paid Time Off
  • Training & Development Plan
  • Performance Bonus
  • GOSI will be covered as labor law.
  • Hardship allowance for working during Ramadan & Public Holidays.

© 2025 Qureos. All rights reserved.