SOC Analyst

✅ Link copied successfully!

SOC Analyst

Position: SOC Analyst - L2 (Threat Hunting, Intelligence, Incident Response)

Location: Riyadh, Saudi Arabia

Salary: 14-15K Total package

 

Key Responsibilities:

 

Threat Hunting: Proactively identify IOCs and APTs using SIEM, EDR, and advanced tools. Develop and refine hunting methodologies.

Threat Intelligence: Analyze internal/external threat data, monitor OSINT/dark web, and create actionable intelligence reports.

Incident Response: Lead containment, eradication, and recovery efforts. Conduct RCA and maintain incident response playbooks.

SOC Operations: Monitor alerts, perform vulnerability assessments, and mentor L1 analysts.

 

Qualifications:

 

4+ years in a SOC with focus on threat hunting, intelligence, and incident response.

Hands-on experience with SIEM (e.g., Splunk, QRadar) and EDR tools.

Certifications like CTIA, GCIH, CISSP, or CEH preferred.

Strong knowledge of network protocols, OS, and cloud security.

Scripting skills (Python, PowerShell) for automation.

 

Preferred Skills:

MITRE ATT&CK framework application.

Knowledge of GDPR, HIPAA, or PCI-DSS.

Shift flexibility for 24/7 SOC operations.

 

????If interested, please share a copy of your Resume -> vikas.khuntia@flintmail.com with position name in the subject along with below information

 

???? Relevant years of experience: -

???? Current location: -

???? Current Salary: -

???? Expected Salary: -

???? Notice period: -

 

Note:- Only candidates meeting the specified experience will be contacted

Login First