SOC L2 Analyst

{{ flashMessage.message }}

JOB DESCRIPTION / ROLE

Employment: Full Time

Introduction
At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to attempt things you've never thought possible. Are you ready to lead in this new era of technology and solve some of the world's most challenging problems? If so, lets talk.

Your Role and Responsibilities

We are looking for a SOC Tier 2 Analyst to support our Security Services team. As a SOC Tier 2 Analyst you will be responsible for monitoring, triage, communication of security incidents for the client. Analysts will use SIEM technology to investigate alerts that are escalated from Tier 1, the client, or from intelligence sources. Furthermore, the SOC Tier 2 Analyst may be required to both monitor and utilize third party toolsets to assist with the identification of security threats, apply various techniques to identify and track cyber threats and analyze various data sources related to security events. The IBM Tier 2 Analyst will communicate with the security team, architects, managers and clients on a regular basis through various methods to ensure operational awareness.

Main tasks and responsibilities will include:

- Determine if the security alert should be classified as a security incident
- Analysis method of attack or threat
- Analysis of actor or object of the attack or threat
- Analysis of known targets and purpose of the attack or threat
- Impact analysis of the attack or threat both in terms of kill chain stage and risk magnitude

Incident handling support

- Use case/rule tuning recommendations
- Testing and maintenance of response procedures
- Participate in lessons learned workshops

REQUIREMENTS

Required Technical and Professional Expertise

- Experience in Monitoring, triage, communication of security incidents for the client.
- Experience in using SIEM technology (IBM QRadar) to investigate alerts that are escalated from Tier 1, the client, or from intelligence sources.
Experience in using third party toolsets to assist with the identification of security threats, apply various techniques to identify and track cyber threats and analyze various data sources related to security events.
- Experience in the analysis method of attack or threat
- Experience in the analysis of actor or object of the attack or threat
- Experience in the analysis of known targets and purpose of the attack or threat
- Use case/rule tuning recommendations
- Testing and maintenance of response procedures
- KSA nationality and fluent in Arabic required

Preferred Technical and Professional Expertise

- Work experience in multinational company

ABOUT THE COMPANY

For more than six decades, IBM Middle East & Pakistan has played a vital role in shaping the information technology landscape of the region. Today, IBM is part of the region's technological fabric, solving real-world business and societal challenges, through its offices in UAE, Saudi Arabia, Qatar, Kuwait and Pakistan, and also a diversity of centers across the region.

Within the region, IBM currently has groundbreaking initiatives in cloud computing, analytics, mobile, security, as well as nanotechnology, eGovernment, healthcare and many more, collaborating with leading educational institutes and governments. IBM supports hundreds of clients to drive transformation through technology, contributes to regional research & development programs and has an active Corporate Service Corps (CSC) program.

Reinvention is a keyword in the company's history and, today, IBM is much more than a "hardware, software, services" company. IBM is now emerging as a cognitive solutions and cloud platform company.

Advertise Here
INSTALL APP
×