Search by job, company or skills

Socium - Teams Done Differently

Cyber Defense Center Analyst (CDC)

new job description bg glownew job description bg glownew job description bg svg
  • Posted a day ago
  • Be among the first 10 applicants
Early Applicant

Job Description

General Description:

Join a dynamic cybersecurity team responsible for monitoring, analyzing, and responding to security events across enterprise systems. The CDC L2 Analyst will conduct in-depth investigations of escalated alerts, perform triage to identify real threats, and take initial containment actions, helping maintain a secure and resilient IT environment.

This role blends technology, security operations, and compliance, providing a key contribution to proactive threat detection and incident response initiatives.

Key Responsibilities:

  • Monitor and analyze security alerts from SIEM, SOAR, EDR, WAF, API gateways, and cloud services.
  • Perform Level 2 triage to validate true positives, eliminate false positives, and detect malicious behavior.
  • Conduct deep-dive investigations across endpoints, identities, APIs, networks, and cloud services.
  • Execute initial containment measures such as account lockout, isolation, or token revocation.
  • Escalate complex incidents with complete investigation notes and evidence.
  • Document incidents and actions with regulatory-aligned traceability.
  • Support threat hunting activities and propose new detection rules and playbooks.
  • Analyze cloud security events, including IAM anomalies, API misuse, container threats, and serverless misuse.
  • Validate and improve monitoring rules and playbooks.
  • Provide structured handovers to other security teams and stakeholders.
  • Participate in post-incident reviews and continuous improvement initiatives.

Educational Qualifications:

  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or equivalent.

Technical Expertise:

  • Security monitoring & incident response (SIEM, SOAR, EDR, WAF, API gateways, cloud logs)
  • Endpoint, network, identity, and cloud security analysis
  • Threat detection, triage, and containment
  • Incident documentation aligned with regulatory standards

Professional Experience:

  • Minimum 35 years in cybersecurity monitoring, SOC operations, or incident response
  • Experience handling escalated security alerts (L2 triage)
  • Exposure to multi-team and multi-vendor IT environments
  • Banking, FinTech or financial services cybersecurity experience is a plus

Other Skills:

  • Strong analytical and problem-solving capabilities
  • Excellent communication and collaboration skills
  • Ability to work independently in a hybrid environment
  • Highly organized with attention to detail
  • Proactive and accountable for security outcomes

Engagement Details:

  • Engagement Type: Project-based / Consulting
  • Start Date: ASAP (2-months notice acceptable)
  • Work Setup: Hybrid Riyadh, KSA (3x a week on-site)
  • Visa Requirement: Open to IQAMA holders

More Info

Job Type:
Industry:
Function:
Employment Type:

Job ID: 135680371