Search by job, company or skills

K20s - Kinetic Technologies Private Limited

SOC Analyst (L2) - KSA, Riyadh (Onsite)

new job description bg glownew job description bg glownew job description bg svg
  • Posted 18 days ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Job Role: SOC Analyst (L2) - KSA

Location: Kingdom of Saudi Arabia (KSA) Onsite

Experience: 3+ years

Employment Type: Semi-Government Sector

Operations: 24/7 Onsite Security Operations Center (SOC)

Contract: 1-Year Extendable Contract

Joining: Immediate Joiners Preferred

Role Summary

Join our dynamic L2 SOC team to provide continuous, high-quality security monitoring and incident response services for a critical semi-government entity. This role requires flexibility for 24/7 operations in a high-stakes, onsite environment.

Key Responsibilities

  • L1 Monitoring & Triage:
  • Perform 24/7 continuous monitoring of security tools (SIEM, EDR, Firewalls, etc.).
  • Conduct initial analysis and triage of security alerts and events.
  • Validate potential security incidents and perform basic enrichment.
  • Escalate validated incidents to the L2 team promptly and accurately.
  • Generate and maintain daily security reports and shift handover logs.
  • L2 Incident Response & Investigation:
  • Execute detailed incident investigation for escalated events.
  • Perform root cause analysis and develop mitigation strategies.
  • Apply standard playbooks and procedures for handling common incident types (malware, phishing, unauthorized access).
  • Coordinate with other IT teams for effective incident resolution and containment.
  • Assist in tuning security monitoring tools to reduce false positives.
  • General:
  • Maintain high proficiency in the SOC environment tools and processes.
  • Document all activities, analysis, and response actions in the ticketing system.
  • Participate in shift rotations for 24/7 operations.

Required Skills & Experience

  • Proven experience in a Security Operations Center (SOC) environment is mandatory.
  • Strong hands-on experience with SIEM platforms (e.g., Splunk, Microsoft Sentinel, etc.).
  • Deep understanding of networking concepts, protocols, and security principles.
  • Knowledge of common attack vectors and threat intelligence concepts.
  • Excellent communication and teamwork skills.
  • Relevant industry certifications (e.g., Security+, CEH, CYSA+) are a plus.

Skills: security operations,splunk,cysa+,firewall,sentinel,networking concepts,security operations center,24/7 operations,incident response,certifications,government,incident investigation,siem,operations,protocols,security+,ceh,soc

More Info

Job Type:
Industry:
Employment Type:

Job ID: 134999499