Submitting more applications increases your chances of landing a job.

Here’s how busy the average job seeker was last month:

Opportunities viewed

Applications submitted

Keep exploring and applying to maximize your chances!

Looking for employers with a proven track record of hiring women?

Click here to explore opportunities now!
We Value Your Feedback

You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for

Would You Be Likely to Participate?

If selected, we will contact you via email with further instructions and details about your participation.

You will receive a $7 payout for answering the survey.


https://bayt.page.link/bByPLhJSYVrSGLqbA
Back to the job results
Other Business Support Services
Create a job alert for similar positions
Job alert turned off. You won’t receive updates for this search anymore.

Job description

  • Perform advanced monitoring, analysis, and investigation of security alerts and incidents.


  • Act as an escalation point for complex incidents and support L1/L2 analysts.


  • Lead incident response activities including containment, eradication, recovery, and root cause analysis.


  • Conduct threat hunting by analyzing logs, network traffic, and endpoint behavior.


  • Fine-tune SIEM use cases, detection rules, and alerts to improve threat visibility.


  • Coordinate with IT, network, application, and cloud teams for remediation activities.


  • Support vulnerability management and risk assessment initiatives.


  • Assist in security audits, compliance activities, and regulatory requirements.


  • Prepare detailed incident reports, dashboards, and metrics for management.


  • Stay updated on emerging threats, vulnerabilities, and attack techniques.



Requirements
  • 5+ years of experience in cybersecurity operations or SOC roles.


  • Strong understanding of cyber threats, attack vectors, and MITRE ATT&CK framework.


  • Hands-on experience with SIEM platforms (Splunk, QRadar, Sentinel, ArcSight).


  • Experience with EDR/XDR, email security, and network security tools.


  • Strong knowledge of Windows and Linux operating systems.


  • Good understanding of networking fundamentals (TCP/IP, DNS, HTTP/S).


  • Experience in incident response, malware analysis (basic), and log analysis.


Preferred Skills


  • Experience with cloud security monitoring (AWS, Azure, GCP).


  • Exposure to SOAR tools and security automation.


  • Basic scripting skills (Python, PowerShell).


  • Experience mentoring junior analysts.


Preferred Certifications
  • CEH, CySA+, or Security+


  • CISSP (preferred but not mandatory)


  • GIAC certifications – added advantage



This job post has been translated by AI and may contain minor differences or errors.

You’ve reached the maximum limit of 15 job alerts. To create a new alert, please delete an existing one first.
Job alert created for this search. You’ll receive updates when new jobs match.
Are you sure you want to unapply?

You'll no longer be considered for this role and your application will be removed from the employer's inbox.