Advanced technology and cybersecurity company (sirar) established by stc, the regions ICT and digital services provider, sirar by stc is a cutting-edge cybersecurity provider that empowers organizations to take control of their cyber capabilities and digital environments.
As experts in business security and privacy, we offer a comprehensive range of solutions that help you to operate online safely, securely, and efficiently. The tools we provide help organizations detect and prevent cybersecurity attacks, safeguard their digital future, and provide protection and security from that point forward.
Key Responsibilities:
Correlates information from multiple sources to understand the situation and determine the effectiveness of an observed attack.
Analyzes network alerts from multiple sources to determine possible causes.
Provides timely detection, identification, and alerting of possible attacks, anomalous activities, and misuse activities and distinguishes them from benign activities.
Analyzes malicious activity to determine vulnerabilities exploited, exploitation methods, and effects on system and information.
Determines tactics, techniques, and procedures (TTP) for intrusion sets.
Examines network topologies to understand data flows through the network.
Identifies indications and warnings through research, analysis, and correlation across multiple data sets.
Isolates and removes malware.
Uses network traffic to reconstruct malicious activity.
Develops and maintains information security metrics.
Reports suspected cyber incidents in line with the organization's cyber incident response plan.
Participates in handling tickets for subscribed customers on required alerts.
Contributes to the overall success of the company by performing all other duties and responsibilities as assigned by the line manager.
Qualifications:
Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related discipline.
Professional Certifications Preferred:
Certificate in CEH/ECIR/CSA/CTIA/GCFE/GCIA/GMON.
Years of Experience:
3 - 5 years of relevant experience.
Skills:
Intermediate proficiency in recognizing vulnerabilities in security systems.
Intermediate proficiency in using intrusion detection technologies to detect host and network-based intrusions.
Intermediate proficiency in effectively recognizing and categorizing types of vulnerabilities and associated attacks.
Intermediate proficiency in assessing security controls based on cybersecurity principles and tenets.
Intermediate proficiency in effectively performing root cause analysis for cybersecurity issues.