Job Title: SOC Senior Analyst
Department: Information Technology Services
Job Purpose The SOC Senior Analyst (L3) is responsible for leading the investigation and response to complex security incidents, particularly those affecting Operational Technology (OT) systems like SCADA, ICS, and PLCs. You’ll be the go-to expert for handling major incidents and mentoring junior SOC analysts. This role focuses on both IT and OT environments, ensuring the highest level of protection for critical infrastructure and industrial control systems. Key Responsibilities
Act as the escalation point for SOC L2 Analysts, especially for incidents involving OT systems (SCADA, PLC, industrial networks).
Analyze and investigate major security incidents, assessing their impact on IT and OT environments.
Lead incident response efforts, recommending containment and recovery steps for IT and OT threats.
Mentor SOC L1 and L2 Analysts, particularly in handling OT-specific security incidents.
Perform threat hunting based on tactics, techniques, and procedures (TTP) and indicators of compromise (IOC) across IT and OT environments.
Conduct malware analysis and digital forensics when necessary, focusing on OT and IT systems.
Work with Detection Engineers to improve and fine-tune threat detection rules, especially for OT security.
Develop use cases to improve SOC operations and security for OT systems.
Maintain and update SOC playbooks, ensuring they reflect current attack trends and best practices for both IT and OT environments.
Prepare detailed reports for major security incidents and deliver regular SOC reports to clients.
Key Result Areas
Keep SOC rulebooks updated and ensure SOC team collaboration.
Respond to security alerts and incidents within service level agreements (SLAs).
Ensure prompt handling of emails and service requests.
Maintain SOC compliance with security standards (ISO 27001, Qatar FIFA 2022 Cybersecurity Framework).
Provide incident reports and action plans following major incidents, particularly those impacting OT systems.
Skills and Experience Minimum Requirements:
Degree in IT or OT-related fields.
7+ years of experience in IT Security (e.g., incident response, malware analysis, digital forensics), with at least 3 years in OT systems like SCADA, ICS, or PLCs.
5+ years of experience managing SIEM tools (Azure Sentinel, Splunk, QRadar) and vulnerability management tools (Qualys, Nessus) for IT and OT.
Experience with security products like EDR, IDS/IPS, NGFW, OT-specific tools (Nozomi Networks, Dragos), and network protocols like Modbus, DNP3.
Strong knowledge of MITRE ATT&CK, particularly for OT systems (ICS framework).
Hands-on experience conducting security incident investigations and analyzing logs from various systems (IT and OT).
Experience with threat hunting techniques (TTPs, IOCs) in both IT and OT environments.
Familiarity with OT-specific forensics and security standards (IEC 62443, NERC CIP).
Desirable Skills:
Experience in SIEM administration and developing security use cases for both IT and OT environments.
Background in OT-specific security frameworks like IEC 62443 or NERC CIP.
Formal training in digital forensics, especially for OT systems.
Certifications:
CISSP or equivalent.
SANS certifications (e.g., GCIH, GCFA, GPEN).
OT security certifications (e.g., GIAC GICSP).
Job Type: Full-time Pay: QAR6,000.00 - QAR12,000.00 per month