اخصائي تحليل امن معلومات - طبقة أولى
Job Purpose:
To secure organizational assets as a proactive SOC Analyst Tier 1 by monitoring, analyzing, and responding to cybersecurity threats in real-time. Leveraging the skills in SIEM tools, log analysis, and incident triage to mitigate risks while adhering to industry best practices (NIST, MITRE ATT&CK). Seeking to contribute to a collaborative SOC team and grow into advanced threat detection and response roles
JOB Responsibilities :
- Security Monitoring & Alert Triage
•Monitor and perform initial analysis of security alerts (SIEM, XDR ,... and security tools) for suspicious activity.
•Analyze and categorize alerts (true positives vs. false positives).
•Escalate confirmed incidents to Tier 2/3 SOC teams with detailed documentation.
- Malware Triage
- Analyze suspicious files in sandboxes.
- Extract hashes, C2 IPs, and behavior from malware samples
- Incident Response (Initial Triage)
- Perform initial investigation of security events (malware, phishing, brute-force attacks, etc.).
- Follow SOPs (Standard Operating Procedures) for incident handling.
- Assist in containment and remediation under supervision.
- Threat Intelligence & Log Analysis
- Review logs from firewalls, IDS/IPS, EDR, and endpoints.
- Use threat intelligence (VirusTotal, AlienVault OTX, AbuseIPDB ,MITRE ATT&CK ,…) to correlate IOCs.
- Basic Threat Hunting
Proactively search for unusual patterns in logs (e.g., failed logins, unusual process execution). - Cybersecurity awareness
Assist in creating, maintenance and delivery of cybersecurity awareness and training to all Technology users in HSA. - Reporting & Documentation
- Security audit
Oversees periodic audits of related system usage and connections to ensure compliance with HSA policies and Procedures. - vulnerability analysis and management
Job Elements:
Education: Specialized Univ. Degree
Experience : prefer to have 1–3 years in SOC or have relevant certification ( CSA ,CEH , CompTIA Security+,... )
Competence Level: Fully Operational
Effort; Mental & Physical: High Intellect & Mental Effort
Supervision: Task
Reports To: SOC Manager / Tier 2 Analyst
Impact: Non-Monetized - Analytical Impact
Required Skills
Technical Skills
- SIEM Tools
- Log Analysis
- Networking: TCP/IP, DNS, VPN, Firewalls .
- OS Knowledge: Windows/Linux security fundamentals.
- Basic Scripting: Python/PowerShell for automation (preferred).
- Knowledge of Cloud Technolgies
Soft Skills
- Strong analytical thinking.
- Ability to work in 24/7 shifts (if required).
- Clear communication for escalation and reporting.