Job Description:
• Candidates will have 1-3 years of experience in a SOC environment, and will have Knowledge of attack vectors (malware, web application, social engineering, etc).
• Experience with incident response and handling.
• SOC Operations: operate SIEM environment in a manner that meets all Service Recipient requirements, including.
• Minimizing cyber security attacks with the ability to capture, load and analyze all types of Security Events in near-real-time.
• Defining collection points and tuning rules as needed to avoid false positives
• Creating correlation rules based on current Security Events, threats, Service Recipient s needs and Provider s knowledge from its customer base, including:
Shift : As per KSA business time 8:00 am till 4:30 pm DST
Roles & Responsibilities :
• Monitoring Services and reacting to triggered alerts.
• Running correlated rules against historical data
• Monitoring threat feeds, the latest vulnerabilities and the latest security news items
• Suppressing or filtering unneeded Events
• Creating alerts based on rules, thresholds, baselines and events
• Providing alerting capability using Service Recipient required communications channels (such as email or short messaging services) and use of ticketing system (eg ServiceNow)
• Checking for a false positive before alerting Service Recipient of a Security Event
• Foundational knowledge around IT Infrastructure (Network or Windows)
• Effective written and verbal communication skills with good analytical skills
• Demand requires Travel? :No
• Certification(s) Required :No