Security Operations Analyst

cyberani solutions
Dhahran Compound
SAR 150,000 - 200,000
Job description

The role of the Security Operations Analyst (Contractor) is to support the intrusion detection system aspects for the Monitoring & Vulnerability Analysis Team as a Computer Security Operations Center (CSOC) Analyst Tier 2 by applying an advanced knowledge of information security services/analysis concepts, practices and procedures. Support will include providing oversight and guidance of analysts for detecting and evaluating intrusions.

Responsibilities:

  • Assess information network threats such as computer viruses, exploits, and malicious attacks; operate vulnerability assessment equipment in support of intrusion analyses
  • Determines true threats, false positives and network system misconfigurations and provide solutions to issues detected in a timely manner.
  • Monitor for potential compromise, intrusion, deficiency, significant event or threat to the security posture and security baseline. Follow intrusion and escalation processes and procedures.
  • Develop/write custom Intrusion Detection System (IDS) signatures and update proprietary signatures
  • Development of standard operating procedures and other technical documentation for the IDS infrastructure
  • Perform daily IDS analysis/monitoring and generating technical and executive summary reports

The role of the Security Operations Analyst (Contractor) is to support the intrusion detection system aspects for the Monitoring & Vulnerability Analysis Team as a Computer Security Operations Center (CSOC) Analyst Tier 2 by applying an advanced knowledge of information security services/analysis concepts, practices and procedures. Support will include providing oversight and guidance of analysts for detecting and evaluating intrusions.

Responsibilities:

  • Assess information network threats such as computer viruses, exploits, and malicious attacks; operate vulnerability assessment equipment in support of intrusion analyses
  • Determines true threats, false positives and network system misconfigurations and provide solutions to issues detected in a timely manner.
  • Monitor for potential compromise, intrusion, deficiency, significant event or threat to the security posture and security baseline. Follow intrusion and escalation processes and procedures.
  • Develop/write custom Intrusion Detection System (IDS) signatures and update proprietary signatures
  • Development of standard operating procedures and other technical documentation for the IDS infrastructure
  • Perform daily IDS analysis/monitoring and generating technical and executive summary reports
","requirements":"
  • Bachelor of Science Degree with a major in Computer Science/Computer Engineering, Engineering, Science or a related field
  • 2 + years relevant experience
  • Experience in systems cyber security analysis
  • Experience working at a Security Operations Center (SOC)/Network Operations Center (NOC)
  • Experience with Computer Emergency/Incident Response Team (CERT/CIRT)
  • Working knowledge of network security management and operations
  • Experience in the detection, response, mitigation, and/or reporting of cyber threats affecting client networks
  • Demonstrated ability to work with network intrusion detection and response operations (Protect, Defend, Respond and Sustain methodology)
  • Ability to manage, respond to and resolve situations caused by network attacks
  • Demonstrated ability using current monitoring technologies such as: SourceFire-SNORT, Splunk, ArcSight, or NetScout etc.
  • Current experience with cyber threats and their associated tactics, techniques, and procedure

Company Industry

  • IT - Software Services

Department / Functional Area

  • IT Software

Keywords

  • Security Operations Analyst

Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at abuse@naukrigulf.com

People Looking for Operations Analyst Jobs also searched

Get a free, confidential resume review.
Select file or drag and drop it
Avatar
Free online coaching
Improve your chances of getting that interview invitation!
Be the first to explore new Security Operations Analyst jobs in Dhahran Compound