Job Title: SOC Operator (SOC L1 Analyst)
Reports to: SOC Manager
Department: Information Technology Services
Job Purpose The SOC L1 Analyst plays a crucial role in monitoring and protecting both IT and Operational Technology (OT) environments, providing 24/7 support to detect and address security threats. The main tasks include initial triage, analysis, and categorization of security incidents to ensure smooth operations and timely response. Key Responsibilities
Monitor and investigate security alerts for both IT and OT environments, determining whether they are real threats or false positives.
Categorize and prioritize security incidents based on agreed rules.
Handle low-complexity incidents related to IT and OT systems, such as SCADA, ICS, and PLC.
Escalate high-priority incidents to SOC L2 Analysts.
Manage the SOC ticket queue and ensure incidents are handled promptly according to SLAs.
Review vulnerability scan reports and assign tasks for remediation.
Contribute to improving SOC processes, focusing on OT security monitoring.
Key Result Areas
Ensure security incidents are resolved within SLAs.
Respond to emails and service requests promptly.
Efficiently manage and escalate SOC tickets as needed.
Minimize SLA breaches and ensure compliance with security standards like ISO 27001 and the FIFA 2022 Cybersecurity Framework.
Skills and Experience Minimum Requirements:
University degree in Information Technology or related field.
At least 3 years of experience with SIEM tools (Azure Sentinel, Splunk, Arc Sight, QRadar, etc.).
2 years of experience with vulnerability scanning tools like Qualys or Tenable.
Familiarity with security products such as EDR, NDR, NGFW, IDS/IPS, and OT tools like Darktrace.
Knowledge of MITRE ATT&CK techniques and OT protocols (Modbus, DNP3).
Basic scripting skills in Python, Power Shell, or Bash.
Understanding of IT service management (ITIL, ISO 27001, NIST).
Desirable Skills:
Experience customizing SIEM tools for OT systems.
Familiarity with frameworks like MITRE ATT&CK and Cyber Kill Chain for OT threats.
Hands-on experience handling security incidents in both IT and OT environments.
Certifications
Entry-level cybersecurity certifications such as CEH, Security+, or e JPT.
SOC-related certifications like Blue Team Level 1 or Range Force SOC Analyst 1.
SIEM tool certifications (e.g., Splunk, Mc Afee, Azure Sentinel).
Job Type: Full-time Pay: QAR6,000.00 - QAR12,000.00 per month