Salla E-Commerce Platform

Senior SOC Analyst

Salla E-Commerce Platform

full-time

Posted on:

Location Type: Hybrid

Location: JeddahSaudi Arabia

Visit company website

Explore more

AI Apply
Apply

Job Level

About the role

  • Perform advanced L2/L3 alert triage and investigations across endpoint, network, cloud, and edge security platforms
  • Lead investigations using SIEM tools to validate incidents, reduce noise, and determine impact
  • Analyze and respond to edge security events including WAF, DDoS, bot activity, and Zero Trust alerts
  • Act as an escalation point for confirmed incidents and support containment and response actions
  • Conduct root cause analysis and threat investigations, identifying attacker behavior and scope of impact
  • Design, tune, and maintain detection rules and logic across SIEM platforms
  • Improve detection coverage by aligning rules with the MITRE ATT&CK framework
  • Mentor and guide junior SOC analysts and contribute to skill development across the team
  • Help build and maintain investigation playbooks and incident response runbooks
  • Collaborate with SOC leadership, Cloud Security, and DevOps teams to improve security controls and visibility

Requirements

  • 5+ years of experience as a SOC Analyst (L2/L3)
  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or equivalent experience
  • Hands-on experience with SIEM platforms (Splunk, Graylog, or similar)
  • Experience performing alert triage, incident investigation, and escalation
  • Strong knowledge of networking protocols (TCP/IP, DNS, HTTP/HTTPS, BGP)
  • Experience analyzing AWS security logs (CloudTrail, CloudWatch, VPC Flow Logs)
  • Experience with container and Kubernetes runtime security (Kubernetes, Amazon EKS)
  • Hands-on experience with Cloudflare security tools (WAF, DDoS, Bot Management, Zero Trust)
  • Strong understanding of IDS/IPS, firewalls, proxies, and DLP technologies
  • Experience conducting root cause analysis and post-incident reviews
  • Familiarity with MITRE ATT&CK framework and NIST incident response standards
  • Experience developing and tuning SIEM detection rules
  • Knowledge of scripting or automation (Python, PowerShell, or Bash)
  • Foundational understanding of AI/ML security concepts and LLM-related risks
  • Strong analytical, investigation, and incident handling skills
  • Ability to communicate technical findings to non-technical stakeholders
  • Relevant certifications preferred (GCIA, GCIH, CompTIA CySA+, AWS Security Specialty)

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
L2/L3 SOC AnalystSIEM platformsalert triageincident investigationnetworking protocolsAWS security logsKubernetes runtime securityCloudflare security toolsroot cause analysisdetection rules
Soft skills
analytical skillsinvestigation skillsincident handling skillscommunication skillsmentoringcollaboration
Certifications
GCIAGCIHCompTIA CySA+AWS Security Specialty