Submitting more applications increases your chances of landing a job.

Here’s how busy the average job seeker was last month:

Opportunities viewed

Applications submitted

Keep exploring and applying to maximize your chances!

Looking for employers with a proven track record of hiring women?

Click here to explore opportunities now!
We Value Your Feedback

You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for

Would You Be Likely to Participate?

If selected, we will contact you via email with further instructions and details about your participation.

You will receive a $7 payout for answering the survey.


User unblocked successfully
https://bayt.page.link/qECCMkvS2MD2y3jx8
Back to the job results

SOC Analyst

19 days ago 2026/05/25 Expires in 15 days
Full time · 4+ Years of Experience
10-49 Employees · Accounting

Get the Bayt App

Download the Bayt App to manage your real time conversation with the recruiter
Download App
Create a job alert for similar positions
Job alert turned off. You won’t receive updates for this search anymore.

Job description

Overview


We are hiring a SOC Analyst (L2) to handle advanced monitoring, incident investigation, response coordination, and automation within a 24/7 Security Operations Center, in full compliance with National Cybersecurity Authority (NCA) regulations.


Must be based in Jeddah or willing to relocate


Mandatory Requirements (Audit-Critical)

  • Valid NCA Category A Certificate (minimum 3 years)
  • Compliance with Saudi Cybersecurity Workforce Framework (SCyWF)
  • Verifiable certifications
  • Willingness to work 24/7 shifts (nights, weekends, holidays)
  • Adherence to NCA regulations (ECC, Incident Management, Workforce Controls)


Note: Non-compliance leads to disqualification.


Key Responsibilities


1. Incident Handling


Investigate medium–high severity incidents

Perform root cause & impact analysis

Correlate logs across SIEM, EDR/XDR, and network tools

Lead containment, eradication, and recovery


2. Detection & Automation


Develop and tune detection rules

Reduce false positives

Support SOAR automation and playbooks

Improve SOC processes


3. Documentation & Compliance


Maintain audit-ready documentation (evidence, timelines, RCA, remediation)

Support NCA audits and regulatory reviews


4. Team Support


Guide L1 analysts

Validate escalations and severity levels

Support knowledge sharing


5. Reporting


Prepare SOC reports (KPIs, SLA, trends)

Present findings to stakeholders

Participate in incident reviews


Technical Requirements

  • SIEM: Microsoft Sentinel, Splunk, IBM QRadar, Elastic
  • SOAR: Playbooks, automation, workflow optimization
  • EDR/XDR investigation
  • Network security tools (Firewall, IDS/IPS)
  • MITRE ATT&CK knowledge
  • Log analysis (Windows, Linux, Cloud, Network)
  • Automation & alert tuning
  • Exposure to AI-driven security tools (plus)


Qualifications & Experience

  • Bachelor’s in Cybersecurity / IT / Computer Science
  • 3–5 years SOC experience
  • Experience handling high-severity incidents
  • Strong analytical and documentation skills
This job post has been translated by AI and may contain minor differences or errors.

Preferred candidate

Years of experience
4+ years
Residence location
Saudi Arabia
Degree
Bachelor's degree / higher diploma

You’ve reached the maximum limit of 15 job alerts. To create a new alert, please delete an existing one first.
Job alert created for this search. You’ll receive updates when new jobs match.
Are you sure you want to unapply?

You'll no longer be considered for this role and your application will be removed from the employer's inbox.