مجموعة هائل سعيد انعم و شركاه
الشركة:  الإدارة الإقليمية - اليمن
المدينة:  صنعاء
التاريخ:  ١٣‏/٠٥‏/٢٠٢٦

اخصائي تحليل امن معلومات - طبقة أولى

Job Purpose:

 

To secure organizational assets as a proactive SOC Analyst Tier 1 by monitoring, analyzing, and responding to cybersecurity threats in real-time. Leveraging the skills in SIEM tools, log analysis, and incident triage to mitigate risks while adhering to industry best practices (NIST, MITRE ATT&CK). Seeking to contribute to a collaborative SOC team and grow into advanced threat detection and response roles

 

JOB Responsibilities  :

 

  1. Security Monitoring & Alert Triage

•Monitor and perform initial analysis of security alerts (SIEM, XDR ,... and security tools) for suspicious activity.

•Analyze and categorize alerts (true positives vs. false positives).

•Escalate confirmed incidents to Tier 2/3 SOC teams with detailed documentation.

 

  1. Malware Triage
  • Analyze suspicious files in sandboxes.
  • Extract hashes, C2 IPs, and behavior from malware samples
  1. Incident Response (Initial Triage)
  • Perform initial investigation of security events (malware, phishing, brute-force   attacks, etc.).
  •  Follow SOPs (Standard Operating Procedures) for incident handling.
  •  Assist in containment and remediation under supervision.
  1. Threat Intelligence & Log Analysis
  • Review logs from firewalls, IDS/IPS, EDR, and endpoints.
  • Use threat intelligence (VirusTotal, AlienVault OTX, AbuseIPDB  ,MITRE ATT&CK ,…) to correlate IOCs.
  1. Basic Threat Hunting
    Proactively search for unusual patterns in logs (e.g., failed logins, unusual process execution).
  2. Cybersecurity awareness
     Assist in creating, maintenance and delivery of cybersecurity awareness and training to all Technology users in HSA.
  3. Reporting & Documentation
  4. Security audit
    Oversees periodic audits of related system usage and connections to ensure compliance with HSA policies and Procedures. 
  5. vulnerability analysis and management

Job Elements:
 

Education: Specialized Univ. Degree

Experience :    prefer to have 1–3 years in SOC  or  have relevant certification ( CSA ,CEH , CompTIA Security+,... ) 

Competence Level: Fully Operational

Effort; Mental & Physical: High Intellect & Mental Effort

Supervision: Task

Reports To: SOC Manager / Tier 2 Analyst

Impact: Non-Monetized - Analytical Impact

 

Required Skills 

Technical Skills

  • SIEM Tools
  • Log Analysis
  • Networking: TCP/IP, DNS, VPN, Firewalls .
  • OS Knowledge: Windows/Linux security fundamentals.
  • Basic Scripting: Python/PowerShell for automation (preferred).
  • Knowledge of Cloud Technolgies

Soft Skills

  • Strong analytical thinking.
  • Ability to work in 24/7 shifts (if required).
  • Clear communication for escalation and reporting.