Key Roles & Responsibilities:
Incident Handling:
• SOC Collaboration: Partner with the Security Operations Center for prompt on-site coordination of all cybersecurity incidents, ensuring a unified and effective response.
• Incident Handling: Direct the investigation and response to cybersecurity incidents with a focus on swift action, containment, and resolution to minimize impact.
• Reporting and Analysis: Generate in-depth incident reports and lead post-incident evaluations to harvest actionable insights and fortify defense mechanisms.
• Procedural Enhancement: Propel the ongoing refinement of the incident response playbook and elevate the incident management process with a focus on continual improvement.
• Drill Facilitation: Organize and conduct regular cyber incident response drills to test and sharpen the organization’s preparedness and response capabilities.
Operations Hygiene:
• Remote Access Oversight: Govern remote access protocols to fortify secure and regulation-compliant connections to company systems.
• Change Management Supervision: Supervise change management processes to preserve cybersecurity integrity amidst system updates and organizational changes.
• Policy Exception Handling: Address and manage exceptions to cybersecurity policies, tailoring best practices to meet the demands of specific operational situations.
• Risk Assessment and Mitigation: Execute comprehensive operational risk evaluations, pinpointing and countering potential security vulnerabilities with strategic measures.
Vulnerability Management:
• Program Coordination: Act as the focal point for the vulnerability management program, managing the systematic identification, evaluation, and prioritization of system vulnerabilities.
• Quality Assurance in Remediation: Oversee the end-to-end execution of vulnerability management tasks, ensuring meticulous tracking, coordination of patch management, and remediation processes to uphold system integrity.
• Reporting and Communication: Deliver punctual and precise reports on vulnerabilities to both management and the national cybersecurity agency, thereby enabling informed and strategic responses to potential threats.
Phishing Analytics:
• Threat Investigation: Perform in-depth analysis and investigations of reported phishing attempts to accurately identify and neutralize threats before they result in breaches.
• Intelligence Correlation: Synchronize phishing incident data with broader threat intelligence to ensure a well-informed and comprehensive understanding of cyber threats.
• Response Coordination: Manage and execute strategic responses to phishing incidents, aiming to reduce their potential impact on the organization.
• Preventive Strategies: Actively contribute to the creation and deployment of preventative solutions, including the strengthening of email security protocols and the advancement of network security infrastructure.
Education & Professional Qualification:
• Bachelor's degree in Cybersecurity, Computer Science, Information Technology, computer engineering, or related field.
• Professional certifications related to security operations and incident handling are preferred.
Professional Experience:
4-6 years of experience in security operations or a similar role, with a proven track record in incident handling and response.
Geographic Experience:
Experience in Middle East is preferred
Computer Skills:
Proficient in using cybersecurity and analytic tools, MS Office suite, and other relevant software.
Language Skills:
Fluent Business English
Arabic is preferred
Market/Industry/Functional Knowledge:
A thorough understanding of cybersecurity operations and incident management practices.
Familiarity with the latest trends in phishing analytics and vulnerability management.
Let our experts design a Professional CV for you.