Qureos

FIND_THE_RIGHTJOB.

Sr MDR Analyst

JOB_REQUIREMENTS

Hires in

Not specified

Employment Type

Not specified

Company Location

Not specified

Salary

Not specified

Company Description

HakTrak Networks is a pioneering company in the Middle East, specializing in the design, construction, and application of Artificial Intelligence (AI) and Machine Learning in cybersecurity. We offer innovative security solutions to businesses of all sizes through our cutting-edge technology and seasoned professionals. Our comprehensive services protect systems from evolving cyber threats, and we provide training to help enterprises manage cybersecurity risks. With extensive expertise, HakTrak Networks is well-equipped to handle complex security challenges and safeguard critical data and infrastructure.


Role Description

This is a full-time remote role for a MDR Analyst . The MDR Analyst you will monitor, investigate, and respond to advanced threats across client environments. You will use MDR/EDR/XDR platforms, threat intelligence, and log analysis to detect suspicious activity, investigate incidents, and recommend or execute containment measures. This role is ideal for security professionals seeking hands-on exposure to threat hunting, incident response, and continuous improvement of detection capabilities .


Qualifications

• Monitor MDR/EDR/XDR platforms for security alerts across client environments.

• Investigate suspicious activities and analyze logs from endpoints, networks, and cloud services.

• Perform threat hunting using IOCs, TTPs, and MITRE ATT&CK mapping.

• Correlate data from multiple sources (SIEM, EDR, Threat Intel feeds) to identify attacks.

• Provide containment & remediation guidance (isolation, blocking, patching).

• Escalate confirmed incidents and collaborate with Incident Response teams.

• Develop, refine, and update detection rules & playbooks to improve MDR effectiveness.

• Assist clients with root cause analysis and post-incident reporting.

• Participate in red/blue/purple team exercises to strengthen detection capabilities.

• Provide client-facing reports and recommendations in clear, business-oriented language.

• Strong Analytical Skills for assessing system performance and identifying potential issues

• Bachelor's degree in Information Technology, Computer Science, or a related field

• Hands-on experience with EDR/XDR tools (CrowdStrike, SentinelOne, Carbon Black, Defender for Endpoint, etc.).

• Knowledge of cloud security monitoring (AWS GuardDuty, Azure Security Center, Google Chronicle).

• Proficiency with SIEM platforms (Splunk, QRadar, Microsoft Sentinel, ELK).

• Knowledge of incident response lifecycle and forensic investigation basics.

• Understanding of attack frameworks (MITRE ATT&CK, Cyber Kill Chain, NIST CSF).

• Ability to create and tune detection rules (Sigma, YARA, Snort/Suricata).

• Scripting/automation skills (Python, PowerShell, Bash) to assist with hunting & response.

• Experience working in a 24/7 SOC/MDR environment is a plus.

• Ability to work independently in a remote setting

• Excellent problem-solving, analytical, and client communication skills .

• Willing to relocate to GCC Countries


Certifications (preferred): CompTIA Security+, CySA+, CEH, CCNA CyberOps, Microsoft SC-200, Splunk Certified User/Analyst.


Send your resume to hiring@haktraknetworks.com

© 2025 Qureos. All rights reserved.