We are looking for The SOC Specialist is responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents within the organization. This role involves working in a Security Operations Center (SOC) environment to ensure the confidentiality, integrity, and availability of IT systems and data. The SOC Specialist will utilize advanced security tools, threat intelligence, and incident response procedures to safeguard the organization against cyber threats.
Key Responsibilities
- Continuous Monitoring: Monitor network traffic, endpoints, and security systems using SIEM tools and other technologies.
- Threat Detection & Analysis: Identify and analyze security alerts, suspicious activities, and potential incidents in real-time.
- Incident Response: Investigate and respond to security incidents.
- Threat Intelligence: Use threat intelligence feeds to improve detection and response capabilities.
- Vulnerability Management: Assist in vulnerability assessments and recommend remediation actions.
- Reporting & Documentation: Prepare detailed incident reports and maintain logs for compliance and audit purposes.
- Collaboration: Work closely with IT and cybersecurity teams to implement security best practices.
- Tool Management: Configure and maintain SOC tools such as SIEM, IDS/IPS, EDR, and firewalls.
- Proactive Threat Hunting:
- Conduct advanced searches for Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs).
- Use threat intelligence and behavioral analytics to identify hidden threats.
- Develop and execute threat hunting hypotheses to uncover sophisticated attacks.
- Document findings and recommend preventive measures to strengthen security posture.
Required Qualifications
- Education: Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field.
- Experience: 2–5 years in SOC operations or cybersecurity roles.
- Certifications (Preferred):
- CompTIA Security+
- Certified SOC Analyst (CSA)
- CEH (Certified Ethical Hacker)
- SIEM-specific certifications (e.g., Splunk)
Skills & Competencies
- Strong knowledge of network protocols, operating systems, and security principles.
- Hands-on experience with SIEM tools (e.g., Splunk, QRadar, ArcSight).
- Familiarity with incident response frameworks (e.g., NIST, SANS).
- Advanced threat hunting and forensic analysis skills.
- Analytical and problem-solving skills with attention to detail.
- Ability to work in a 24/7 shift environment if required.
Job Type: Full-time
Application Question(s):
Education:
Experience:
- in IT: 4 years (Required)
- SOC : 3 years (Required)
- security systems using SIEM: 3 years (Required)
- cybersecurity operations: 3 years (Preferred)
Language:
- Arabic (Preferred)
- English (Required)
License/Certification:
- driving (Preferred)
- golden visa (Preferred)