hireejobsgulf

Security Operations Center (SOC) Analyst

4.00 to 6.00 Years   Saudi Arabia   30 Nov, 2021
Job LocationSaudi Arabia
EducationBachelor's degree / higher diploma
SalaryNot Mentioned
IndustryOther Business Support Services
Functional AreaNot Mentioned

Job Description

Development of the systems security testing and maintenance. Analyze the security of processes and integrated systems; apply the principles of cyber-security architecture targeting the services to meet the requirements of encryption, management of authority, confidentiality, safety, and availability. Coordinate with SOC service providers and internal Networks team to proactively manage any network security risksMain tasks:

  • Conduct cyber-security testing for the exported applications and/or systems to ensure that they include cyber-security functions such as encryption, access control and identity management.
  • apply the principles of cyber-security architecture targeting the services to meet the requirements of encryption, management of authority, confidentiality, safety and availability.
  • Apply cyber-security policies and controls to overlapping applications, such as business-to-business transactions.
  • Integrate the automated capabilities to update or repair the system software with respect to cyber-security, wherever applicable; and issue the processes and procedures for manually updating and repairing the system software, based on the schedule requirements for current and projected update and fixes packages for the systems operational environment.
  • Ensure the implementation of security updates and fixes for commercial products embedded in the system design in accordance with the timeframes provided by the relevant management in the respective operating environment, ensuring cyber protection to all its core functions.
  • Carry out authorized breaches of computer systems, networks, and their locations using realistic threat methods to assess their security and detect potential vulnerabilities.
  • Perform several types of cybersecurity assessments at the infrastructure or applications level, including vulnerability scanning, experimental breaches, and intrusion testing.
  • Use multiple methods of testing through simulating the attacks used by social engineering hackers attempting to breach the system, use social engineering to detect security vulnerabilities (such as security practices or weak password policies).
  • Prepare assessment reports after breach testing activities are completed, which include results, risk level, mitigation suggestions, and all the technical details needed to duplicate the test results.
  • Collect information on networks using traditional and alternative methods (such as social network analysis, call chaining, traffic analysis), and document the findings.
  • Study, document, and discuss security findings with management, leadership, and IT teams, provide advice about the methods to address or reduce system security risks.

Keyskills :

APPLY NOW

Related Jobs

© 2023 HireeJobsGulf All Rights Reserved