Send me more jobs like this
Get Email Alerts
Job Summary
Skills
- Threat Management
- Cyber Threat Hunting (CTH)
- Cybersecurity
- Cyber Threat Intelligence (CTI)
- Cyber Defense
Qualifications
- Bachelor’s degree in Engineering or related technical discipline. Professional Certifications Preferred.
- A minimum of 4 years of relevant experience with at least 3 years in a similar role
Jobs at this level are responsible for carrying out a range of cybersecurity threat analysis activities including identifying anomalous and malicious activity as well as managing the determination of potential threat through determining potential scope and implementing mitigations.
Responsibilities
- Analyze threat intelligence reports customization that present extensive and deep views of current cyber threats
- Participate in the design and development of features and capabilities for secure sharing of cybersecurity related information among related entities
- Analyze submitted cybersecurity questions
- Support team members in methods to process tactical mitigations based on results of analysis and determination of threat validity
- Participate in preparing reports to ensure proper understanding of threat campaign(s) techniques, lateral movements and extract indicators of compromise
- Coordinate cross-functionally to accomplish assigned tasks
- Conduct the necessary day-to-day activities with minimal supervision to ensure continuity of work
- Follow-up on escalated cases /issues/questions of subordinates to ensure they are closed efficiently and in a timely manner
- Maintain an understanding of the current vulnerabilities, response, and mitigation strategies used in cybersecurity operations
- Maintain an intrusion database and analyze data from sensors, network security devices and applications using the security information event management systems, log servers, application interfaces and device consoles provided
Identify anomalous and malicious activity
- Conduct trend analysis and correlation understanding for the purposes of attribution through identified indicators of compromise and behaviors associated with targeted behavior
- Understand and leverage sources of information to provide tactical to strategic level analysis and recommendations
- Provide clients with anticipatory cyber threats and warnings of future potential attacks based upon confidence levels and probabilities
- Deploy threat intelligence analysts on client premises to evaluate the effect of current cyber threats on clients’ systems, applications and processes at risk
We are established for enriching local content in designing, developing, and operating secure digital computing environments through Saudi talents, by fulfilling our role as a premier consultant and provider of secure digital services and solutions for major and vital government and private entities. We are providing the latest professional services for cybersecurity and solutions, software development, data science and data analysis, in collaboration with pioneering national and international partners in the technology ecosystem.
Visit Website