Cyber Security Specialist

Send me more jobs like this Get Email Alerts
  • Company: SITE
  • Employment Type: Full Time
  • Education Level: Bachelor
  • Experience: 4 Years
  • Key Skills: Maintain an understanding of the current vulnerabilities
  • Job Type: Security

Job Summary

Skills

  • Threat Management
  • Cyber Threat Hunting (CTH)
  • Cybersecurity
  • Cyber Threat Intelligence (CTI)
  • Cyber Defense

Qualifications

  • Bachelor’s degree in Engineering or related technical discipline. Professional Certifications Preferred.
  • A minimum of 4 years of relevant experience with at least 3 years in a similar role

Jobs at this level are responsible for carrying out a range of cybersecurity threat analysis activities including identifying anomalous and malicious activity as well as managing the determination of potential threat through determining potential scope and implementing mitigations.

Responsibilities

  • Analyze threat intelligence reports customization that present extensive and deep views of current cyber threats
  • Participate in the design and development of features and capabilities for secure sharing of cybersecurity related information among related entities
  • Analyze submitted cybersecurity questions
  • Support team members in methods to process tactical mitigations based on results of analysis and determination of threat validity
  • Participate in preparing reports to ensure proper understanding of threat campaign(s) techniques, lateral movements and extract indicators of compromise
  • Coordinate cross-functionally to accomplish assigned tasks
  • Conduct the necessary day-to-day activities with minimal supervision to ensure continuity of work
  • Follow-up on escalated cases /issues/questions of subordinates to ensure they are closed efficiently and in a timely manner
  • Maintain an understanding of the current vulnerabilities, response, and mitigation strategies used in cybersecurity operations
  • Maintain an intrusion database and analyze data from sensors, network security devices and applications using the security information event management systems, log servers, application interfaces and device consoles provided
    Identify anomalous and malicious activity
  • Conduct trend analysis and correlation understanding for the purposes of attribution through identified indicators of compromise and behaviors associated with targeted behavior
  • Understand and leverage sources of information to provide tactical to strategic level analysis and recommendations
  • Provide clients with anticipatory cyber threats and warnings of future potential attacks based upon confidence levels and probabilities
  • Deploy threat intelligence analysts on client premises to evaluate the effect of current cyber threats on clients’ systems, applications and processes at risk

About Company

We are established for enriching local content in designing, developing, and operating secure digital computing environments through Saudi talents, by fulfilling our role as a premier consultant and provider of secure digital services and solutions for major and vital government and private entities. We are providing the latest professional services for cybersecurity and solutions, software development, data science and data analysis, in collaboration with pioneering national and international partners in the technology ecosystem.

   Visit Website

Courses to Advance Your Career

Aviation Security Basic
Aviation Security Basic
  • AED 6,600
Inquire
Aviation Security Supervisors
Aviation Security Supervisors
  • AED 6,600
Inquire
Bachelor of Science in Information Security
Bachelor of Science in Information Security
Bachelor of Security Studies
Bachelor of Security Studies
  • AUD 34,800
Inquire
Bachelor of Security Studies with the degree of Bachelor of Laws
  • AUD 37,500
Inquire