···
Log in / Register
CSOC Analyst L2
Indeed
Full-time
Onsite
No experience limit
No degree limit
Miswaco, Doha, Qatar
Favourites
Share
Description

Summary: Join a Security Operations Center team to triage and analyze operating system cyber security incidents, advising on remediation and supporting threat detection. Highlights: 1. Perform deep-dive incident analysis and advise on remediation. 2. Proactively monitor operating systems for security alerts and conduct triage. 3. Support security controls management and threat detection analytics. **Job responsibilities:** Responsible to triage operating system related cyber security incidents as a member of Security Operations Center incident responders’ team second line. Performs deep\-dive incident analysis by correlating data from various sources; determines if a critical system or data set has been impacted; advises on remediation; provides support for new analytic methods for detecting threats. * Proactively monitoring the operating systems alert queue using multiple tools, such as SIEM, EDR and custom\-built system monitoring tools. * Conducting triage of alerts to identify potential, false positives, policy violations, intrusion attempts and compromises on the system level. * Consolidating data from alert triage to provide context necessary to escalate Tier 3 Analyst. * Escalate to Tier 3 Analyst with all necessary data for deeper analysis and review. * Collecting evidence on operating system level for Incident analysis. * Advises on remediation. * Supporting operating system related security controls management. * Supporting operating system related threat detection analytics. Should have good knowledge of security tools and skills as follows: * Knowledge about MS Windows and UNIX based systems * Knowledge TCP/IP version 4 and version 6 * Manual testing skills * Automation testing skills * Technical writing skills * Problem solving skills and attention for detail * Malware analysis sandboxing solution, Security Event and Incident Monitoring System (SIEM), Orchestration tool and playbook response concept, Endpoint Detection and Response tool (EDR), Anti\-malware systems, Intrusion Detection and Prevention Systems, Firewalls. **Required industry certificates:** * ECC CEH – Certified Ethical Hacker \- in good standing * some of SANS, GIAC, ISACA, (ISC)2 certificates or trainings \- in good standing **Recommended industry certificates:** * SANS, GIAC, ISACA, (ISC)2

Source:  indeed View original post
Fatima Al-Kuwari
Indeed · HR

Company

Indeed
Fatima Al-Kuwari
Indeed · HR
Cookie
Cookie Settings
Our Apps
Download
Download on the
APP Store
Download
Get it on
Google Play
© 2025 Servanan International Pte. Ltd.