L1 Cyber Security Analyst
Get Noticed
- Make sure Obrela actually reads your resume
- Get AI-rewritten bullet points
- Download Gulf-ready CV
60 seconds. $3.99 one-time.
The Cyber Analyst performs real time event and incident management processes of SOC, as well as internal security incidents evaluation and response following the event management guidelines and policies of SOC.
⢠Real-Time Event & Log monitoring and analysis using leading SIEM Technology
⢠Security Incidents identification and 1st-level investigation
⢠Escalation to Level 2 Analysts for incident response Requirements
⢠Bachelor's degree in Computer Science or relevant field
⢠Masterās degree in Information Security is desired
⢠Ability to work on a flexible, rotational 24x7x365 schedule
⢠Ability to follow processes and procedures and prioritize tasks
⢠Knowledge and understanding of standard & modern attack techniques and strong awareness of the current threat landscape is desired
⢠Knowledge of TCP/IP, Linux and Windows infrastructures and basic network security architecture concepts
⢠Excellent verbal and written communication skills in English
⢠Analytical and troubleshooting skills on short timeframes
⢠No prior working experience with SIEM/Log Analysis is required, but it will be considered a plus Benefits
⢠Dynamic and respectful environment ā our people are the core of our business, we value each and every individual and support initiatives, promoting agility and work/life balance.
⢠Continuous coaching ā work with passionate people and receive both theoretical as well as hands-on training
⢠Career development. Expand your career internationally and work alongside knowledgeable people from diverse cultures and backgrounds
⢠A competitive compensation package dependent upon your experience and qualifications. Weāre focused on rewarding effĪærts. Our salaries and benefits package will keep you motivated throughout your career
Requirements
- ā¢Bachelor's degree in Computer Science or relevant field
- ā¢Masterās degree in Information Security is desired
- ā¢Ability to work on a flexible, rotational 24x7x365 schedule
- ā¢Ability to follow processes and procedures and prioritize tasks
- ā¢Knowledge of standard modern attack techniques
- ā¢Strong awareness of the current threat landscape is desired
- ā¢Knowledge of TCP/IP, Linux and Windows infrastructures
- ā¢Basic network security architecture concepts
Nice to Have
- ā¢No prior working experience with SIEM/Log Analysis is required, but it will be considered a plus
- ā¢Excellent verbal and written communication skills in English
- ā¢Analytical and troubleshooting skills on short timeframes
Responsibilities
- ā¢Perform real time event and incident management processes of SOC
- ā¢Internal security incidents evaluation and response
- ā¢Real-Time Event Log monitoring and analysis using SIEM Technology
- ā¢Security Incidents identification and 1st-level investigation
- ā¢Escalation to Level 2 Analysts for incident response
Related Jobs
Browse Similar
- Make sure Obrela actually reads your resume
- Get AI-rewritten bullet points
- Download Gulf-ready CV
60 seconds. $3.99 one-time.
Obrela offers cybersecurity, cloud, and IT managed services. It focuses on helping businesses protect their data and digital assets.
Visit WebsiteView all jobs