Security Operations Specialist

Job Details

Manama, Capital, Bahrain
Infonas
04.05.2024
Want updates for this and similar Jobs?

Full Job Description

As a Security Operations Specialist at Infonas, you will play a crucial role in identifying, analyzing, and reporting events that occur or might occur within the network. Your primary responsibility will be to use defensive measures and information collected from various sources to protect information, information systems, and networks from potential threats. You will utilize your expertise in cybersecurity and privacy principles to assess organizational requirements and apply appropriate techniques for detecting and responding to intrusions. Additionally, you will conduct vulnerability scans, analyze malware, interpret network tool information, and contribute to the development of cyber defense tools.

Main Tasks & Responsibilities

Characterize and analyze network traffic to identify anomalous activity and potential threats.

Analyze identified malicious activity to determine weaknesses exploited and their effects on systems and information.

Conduct research, analysis, and correlation across various data sets to identify indications and warnings.

Validate intrusion detection system (IDS) alerts through packet analysis.

Assist in the construction of signatures for cyber defense network tools to respond to new or observed threats.

Monitor external data sources to stay updated on cyber defense threat conditions.

Assess and monitor cybersecurity related requirements to system implementation and testing practices.

Provide recommendations for disaster recovery, contingency, and continuity of operations plans.

Collaborate with enterprise-wide IT and network staff to validate network alerts and share relevant information.

Document and escalate incidents that may impact the environment for further action.

Provide timely detection, identification, and alerting of possible attacks, intrusions, and anomalous activities.

Collaborate with stakeholders to resolve computer security incidents and ensure vulnerability compliance.

Perform regular information security reviews to ensure the upkeep and relevance of the information security management system.

Monitor logs and security tools on a periodic basis to ensure that any anomalous activity is accordingly mitigated.

Monitor logs to ensure that system backups are appropriately being taken.

Monitor logical access on a periodic basis to ensure no unauthorized access takes places and no unnecessary privileges are being assigned and dormant users are appropriately revoked.

Continuously assess the physical security measures, surveillance systems, and access control measures to detect and respond to potential security threats or breaches.

Provide appropriate guidance to ensure that network devices such as firewalls, switches and routers are appropriately hardened.

Knowledge & Skills
  • Solid understanding of computer networking concepts, protocols, and network security methodologies.
  • Proficiency in analyzing malware and conducting vulnerability scans.
  • Strong knowledge of cybersecurity and privacy principles, including relevant laws and regulations.
  • Familiarity with intrusion detection and security monitoring technologies.
  • Ability to interpret information collected by network tools such as Nslookup, Ping, and Traceroute.
  • Strong analytical skills and the ability to recognize and categorize vulnerabilities and associated attacks.
  • Experience in using incident handling methodologies and protocol analyzers.
  • Effective communication skills to document and report incidents, trends, and system security posture.
  • Familiarity with cyber defense tools and their capabilities.
  • Knowledge of encryption algorithms, cryptography, and cryptographic key management concepts.
  • Understanding of network traffic analysis methods and network access control mechanisms.
  • Proficiency in operating systems, network protocols, and security system design tools.
  • Familiarity with telecommunications concepts and Virtual Private Network (VPN) security.
  • Experience in conducting packet-level analysis using tools like Wireshark.
  • Strong problem-solving skills and the ability to work collaboratively in a team environment.
  • Knowledge of computer programming languages.
Qualifications and Experience
  • Bachelor’s Degree/Masters Degree in Information Security, Computer Science, Digital Forensics, Cybersecurity, Information Assurance, Security Risk Management, Network Security or any other related field or equivalent security experience.
  • Certifications are a plus but are not essential provided that the job requirements are met.
  • Communication: Clear and effective exchange of information, both verbally and in writing.
  • Collaboration: Working well with others in a team-oriented environment.
  • Adaptability: Being flexible and open to change in a dynamic work environment.
  • Problem-solving: Identifying, analyzing, and solving problems effectively.
  • Time management: Efficiently managing one’s own time and prioritizing tasks.
  • Emotional intelligence: Understanding and managing emotions, as well as empathizing with others.
  • Leadership: Influencing and guiding others towards common goals.
  • Conflict resolution: Addressing and resolving conflicts in a constructive manner.
  • Creativity: Thinking outside the box and generating innovative ideas.
  • Work ethic: Demonstrating strong commitment, reliability, and accountability.
  • Cultural diversity: Ability to work effectively with individuals from diverse cultural backgrounds by recognizing, respecting, and valuing the differences and unique perspectives that individuals from different cultures bring to the workplace.
  • Critical and analytical thinking: The ability to systematically and objectively analyze information, situations, and problems to arrive at well-reasoned and informed decisions. The ability to question assumptions, consider alternative perspectives, and evaluate evidence and arguments. The ability to identify relevant information, distinguish between fact and opinion, and recognize biases or logical fallacies.
  • Motivation: Highly motivated individual who demonstrates a strong drive to excel in their work, consistently delivering results and surpassing expectations.
  • Positive attitude: a self-starting attitude, taking initiative and displaying a proactive approach to problem-solving and achieving team objectives.
  • Growth Mindset: Intrinsically motivated, continuously seeking opportunities for growth, learning and development, and maintaining a positive and enthusiastic mindset even in challenging situations.
  • Accountability and ownership: Demonstrates accountability for their actions, taking ownership of their work and accepting responsibility for delivering high-quality results. Demonstrates a strong sense of ownership, proactively taking initiative and holding themselves accountable for meeting objectives and driving success within their role.
Security Operations Specialist Main purpose

As a Security Operations Specialist at Infonas, you will play a crucial role in identifying, analyzing, and reporting events that occur or might occur within the network. Your primary responsibility will be to use defensive measures and information collected from various sources to protect information, information systems, and networks from potential threats. You will utilize your expertise in cybersecurity and privacy principles to assess organizational requirements and apply appropriate techniques for detecting and responding to intrusions. Additionally, you will conduct vulnerability scans, analyze malware, interpret network tool information, and contribute to the development of cyber defense tools.

Main Tasks & Responsibilities
  • Characterize and analyze network traffic to identify anomalous activity and potential threats.

  • Analyze identified malicious activity to determine weaknesses exploited and their effects on systems and information.

  • Conduct research, analysis, and correlation across various data sets to identify indications and warnings.

  • Validate intrusion detection system (IDS) alerts through packet analysis.

  • Assist in the construction of signatures for cyber defense network tools to respond to new or observed threats.

  • Monitor external data sources to stay updated on cyber defense threat conditions.

  • Assess and monitor cybersecurity related requirements to system implementation and testing practices.

  • Provide recommendations for disaster recovery, contingency, and continuity of operations plans.

  • Collaborate with enterprise-wide IT and network staff to validate network alerts and share relevant information.

  • Document and escalate incidents that may impact the environment for further action.

  • Provide timely detection, identification, and alerting of possible attacks, intrusions, and anomalous activities.

  • Collaborate with stakeholders to resolve computer security incidents and ensure vulnerability compliance.

  • Perform regular information security reviews to ensure the upkeep and relevance of the information security management system.

  • Monitor logs and security tools on a periodic basis to ensure that any anomalous activity is accordingly mitigated.

  • Monitor logs to ensure that system backups are appropriately being taken.

  • Monitor logical access on a periodic basis to ensure no unauthorized access takes places and no unnecessary privileges are being assigned and dormant users are appropriately revoked.

  • Continuously assess the physical security measures, surveillance systems, and access control measures to detect and respond to potential security threats or breaches.

  • Provide appropriate guidance to ensure that network devices such as firewalls, switches and routers are appropriately hardened.

Knowledge & Skills
  • Solid understanding of computer networking concepts, protocols, and network security methodologies.
  • Proficiency in analyzing malware and conducting vulnerability scans.
  • Strong knowledge of cybersecurity and privacy principles, including relevant laws and regulations.
  • Familiarity with intrusion detection and security monitoring technologies.
  • Ability to interpret information collected by network tools such as Nslookup, Ping, and Traceroute.
  • Strong analytical skills and the ability to recognize and categorize vulnerabilities and associated attacks.
  • Experience in using incident handling methodologies and protocol analyzers.
  • Effective communication skills to document and report incidents, trends, and system security posture.
  • Familiarity with cyber defense tools and their capabilities.
  • Knowledge of encryption algorithms, cryptography, and cryptographic key management concepts.
  • Understanding of network traffic analysis methods and network access control mechanisms.
  • Proficiency in operating systems, network protocols, and security system design tools.
  • Familiarity with telecommunications concepts and Virtual Private Network (VPN) security.
  • Experience in conducting packet-level analysis using tools like Wireshark.
  • Strong problem-solving skills and the ability to work collaboratively in a team environment.
  • Knowledge of computer programming languages.
Qualifications and Experience
  • Bachelor’s Degree/Masters Degree in Information Security, Computer Science, Digital Forensics, Cybersecurity, Information Assurance, Security Risk Management, Network Security or any other related field or equivalent security experience.
  • Certifications are a plus but are not essential provided that the job requirements are met.
Key Competencies
  • Communication: Clear and effective exchange of information, both verbally and in writing.
  • Collaboration: Working well with others in a team-oriented environment.
  • Adaptability: Being flexible and open to change in a dynamic work environment.
  • Problem-solving: Identifying, analyzing, and solving problems effectively.
  • Time management: Efficiently managing one’s own time and prioritizing tasks.
  • Emotional intelligence: Understanding and managing emotions, as well as empathizing with others.
  • Leadership: Influencing and guiding others towards common goals.
  • Conflict resolution: Addressing and resolving conflicts in a constructive manner.
  • Creativity: Thinking outside the box and generating innovative ideas.
  • Work ethic: Demonstrating strong commitment, reliability, and accountability.
  • Cultural diversity: Ability to work effectively with individuals from diverse cultural backgrounds by recognizing, respecting, and valuing the differences and unique perspectives that individuals from different cultures bring to the workplace.
  • Critical and analytical thinking: The ability to systematically and objectively analyze information, situations, and problems to arrive at well-reasoned and informed decisions. The ability to question assumptions, consider alternative perspectives, and evaluate evidence and arguments. The ability to identify relevant information, distinguish between fact and opinion, and recognize biases or logical fallacies.
  • Motivation: Highly motivated individual who demonstrates a strong drive to excel in their work, consistently delivering results and surpassing expectations.
  • Positive attitude: a self-starting attitude, taking initiative and displaying a proactive approach to problem-solving and achieving team objectives.
  • Growth Mindset: Intrinsically motivated, continuously seeking opportunities for growth, learning and development, and maintaining a positive and enthusiastic mindset even in challenging situations.
  • Accountability and ownership: Demonstrates accountability for their actions, taking ownership of their work and accepting responsibility for delivering high-quality results. Demonstrates a strong sense of ownership, proactively taking initiative and holding themselves accountable for meeting objectives and driving success within their role.
Send your CV to with
vacancy title: Security Operations Specialist
vacancy code: 25366

By clicking “I Agree”, you are consenting to the processing of your personal information asdescribed in Infonas’Privacy Policy .The details, including your name, email address/phone number, will be used to address your queryand/or share information related to our products/services.Should you wish not to receive such information please reach out to our DPO

What about other tracking technologies, like web beacons? Links to other websites Where can I get further information? #J-18808-Ljbffr
Report Job