2 773 Security Operations jobs in Bahrain
Senior Information Security Analyst - Threat Intelligence & Incident Response
Posted 1 day ago
Job Viewed
Job Description
- Developing and implementing threat intelligence programs to identify and track emerging cyber threats relevant to the organization.
- Conducting in-depth vulnerability assessments and penetration testing to identify security weaknesses.
- Leading and managing incident response activities, including containment, eradication, and recovery from security breaches.
- Analyzing security logs and events from various sources (SIEM, IDS/IPS, firewalls) to detect and respond to threats.
- Developing and maintaining incident response playbooks and procedures.
- Performing digital forensics investigations to determine the scope and impact of security incidents.
- Recommending and implementing security controls and best practices to mitigate identified risks.
- Collaborating with IT and business units to ensure security requirements are met.
- Staying up-to-date with the latest security threats, vulnerabilities, and mitigation techniques.
- Participating in security awareness training initiatives.
- Assisting in the development and refinement of the organization's overall security strategy.
- Monitoring security systems and responding to alerts in a timely manner.
- Generating detailed reports on security incidents, vulnerabilities, and recommendations.
Qualifications:
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 5+ years of experience in information security, with a focus on threat intelligence and incident response.
- Strong understanding of networking protocols, operating systems, and common attack vectors.
- Experience with SIEM tools (e.g., Splunk, QRadar), vulnerability scanners, and forensic tools.
- Relevant security certifications such as CISSP, CEH, GIAC, or OSCP are highly desirable.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation is a plus.
- Excellent analytical, problem-solving, and communication skills.
- Ability to work under pressure and manage critical incidents effectively.
This is a challenging role that offers significant impact in safeguarding sensitive data and systems.
Security Operations Center (SOC) Analyst
Posted 20 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and events from SIEM, IDS/IPS, EDR, and other security tools.
- Analyze security incidents to determine scope, impact, and root cause.
- Perform initial triage and provide rapid response to security threats.
- Escalate critical incidents to appropriate teams and stakeholders.
- Document incident details, actions taken, and resolutions.
- Conduct threat hunting to proactively identify potential security breaches.
- Assist in the development and tuning of security detection rules and signatures.
- Contribute to the creation and maintenance of SOC playbooks and procedures.
- Stay informed about current cybersecurity threats and trends.
- Participate in post-incident reviews and contribute to lessons learned.
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 2-4 years of experience in a SOC or cybersecurity operations role.
- Proficiency with SIEM platforms (e.g., Splunk, QRadar, ELK Stack).
- Familiarity with network security principles and protocols (TCP/IP, DNS, HTTP/S).
- Experience with endpoint detection and response (EDR) tools.
- Understanding of common attack vectors and mitigation techniques.
- Excellent analytical and problem-solving skills.
- Ability to work in a shift-based environment, including nights and weekends.
- Relevant certifications (e.g., CompTIA Security+, CySA+) are a plus.
Security Operations Center (SOC) Lead
Posted 12 days ago
Job Viewed
Job Description
Key Responsibilities:
- Lead and manage the Security Operations Center (SOC) team, providing guidance, mentorship, and performance management.
- Oversee the continuous monitoring of security alerts, logs, and network traffic for potential security incidents.
- Develop, refine, and implement SOC processes, playbooks, and standard operating procedures.
- Direct the investigation and analysis of security incidents, ensuring timely and accurate containment and eradication.
- Manage the deployment, configuration, and maintenance of SOC tools, including SIEM, IDS/IPS, EDR, and threat intelligence platforms.
- Coordinate with internal IT teams and external stakeholders during incident response activities.
- Conduct threat hunting activities to proactively identify and mitigate emerging threats.
- Analyze security trends and provide regular reports on SOC performance and the organization's security posture.
- Stay current with the latest cyber threat intelligence, attack vectors, and defensive techniques.
- Ensure compliance with security policies, procedures, and regulatory requirements.
- Facilitate post-incident reviews and identify lessons learned to improve SOC operations.
- Develop training materials and conduct training sessions for SOC analysts.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 5-7 years of experience in Security Operations, incident response, or a related cybersecurity discipline, with at least 2 years in a leadership or supervisory role.
- Proven experience in managing and leading a SOC team.
- Deep understanding of cybersecurity principles, frameworks (NIST, ISO 27001), and threat landscapes.
- Expertise in using and managing SIEM, IDS/IPS, EDR, and other SOC-related technologies.
- Strong knowledge of network protocols, security architectures, and common attack techniques.
- Excellent analytical, critical thinking, and problem-solving skills.
- Demonstrated experience in incident response and forensics.
- Strong communication, leadership, and interpersonal skills.
- Relevant certifications such as CISSP, CISM, GCIA, GCIH, or similar are highly advantageous.
- Ability to work effectively under pressure and make critical decisions in high-stakes situations.
Security Operations Center (SOC) Manager
Posted 15 days ago
Job Viewed
Job Description
Key Responsibilities:
- Lead and manage the Security Operations Center (SOC) team and its daily operations.
- Develop, implement, and maintain SOC procedures, playbooks, and workflows.
- Oversee threat detection, analysis, and incident response activities.
- Manage and optimize SOC tools, including SIEM, EDR, and threat intelligence platforms.
- Ensure timely and effective communication of security incidents to stakeholders.
- Mentor and develop SOC analysts, fostering a high-performance team environment.
- Stay abreast of the latest cybersecurity threats, vulnerabilities, and mitigation strategies.
- Report on SOC performance metrics and key risk indicators.
- Bachelor's degree in Computer Science, Cybersecurity, or a related field.
- 7+ years of experience in cybersecurity, with at least 3 years in a leadership or management role within a SOC environment.
- Strong understanding of security operations, threat hunting, and incident response methodologies.
- Expertise in SIEM, IDS/IPS, EDR, and other security monitoring technologies.
- Excellent leadership, communication, and team management skills.
- Knowledge of relevant compliance and regulatory frameworks.
- Relevant advanced certifications such as CISSP, CISM, or GIAC certifications.
Senior SOC Analyst - Security Operations Center
Posted 5 days ago
Job Viewed
Job Description
Key responsibilities include monitoring security alerts from various sources such as SIEM, IDS/IPS, and endpoint detection solutions. You will conduct in-depth investigations into security events, perform forensic analysis, and develop detailed incident reports. Proactive threat hunting, vulnerability assessment, and the implementation of security best practices will be integral to your role. You will also contribute to the refinement of SOC procedures, playbooks, and the development of new detection rules to enhance the organization's overall security posture. Collaboration with other security teams and IT personnel to resolve incidents effectively is key.
The ideal candidate will possess a Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field, or equivalent extensive work experience. A minimum of 5 years of hands-on experience in a Security Operations Center (SOC) environment or in a similar incident response capacity is required. Demonstrated proficiency in using SIEM tools (e.g., Splunk, QRadar, ELK), EDR solutions, and network security monitoring tools is essential. Strong understanding of attack vectors, malware analysis, and common security frameworks is crucial. Excellent analytical, problem-solving, and communication skills are necessary to excel in this remote, collaborative role. Relevant certifications such as GCIH, GCIA, CEH, or CISSP are highly regarded. This is a prime opportunity to advance your cybersecurity career in a challenging and supportive remote setting.
Senior Security Operations Center (SOC) Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze security alerts from a variety of sources, including SIEM, IDS/IPS, EDR, and threat intelligence feeds.
- Investigate potential security incidents, perform in-depth forensic analysis, and identify indicators of compromise (IOCs).
- Develop and refine detection rules, playbooks, and SOAR workflows to enhance threat detection and response capabilities.
- Provide mentorship and guidance to junior SOC analysts.
- Conduct threat hunting exercises to proactively identify advanced persistent threats (APTs).
- Stay current with emerging threats, vulnerabilities, and attack techniques.
- Collaborate with incident response teams to contain and eradicate threats.
- Contribute to the development and maintenance of security policies and procedures.
- Generate comprehensive reports on security incidents, threat trends, and SOC performance.
- Participate in on-call rotations to ensure 24/7 security monitoring.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 5 years of experience in a Security Operations Center (SOC) or similar cybersecurity role.
- Extensive experience with SIEM platforms (e.g., Splunk, QRadar, LogRhythm), EDR solutions, and network security tools.
- Strong understanding of various attack vectors, threat actors, and malware analysis.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation and analysis.
- Experience with cloud security monitoring (AWS, Azure, GCP) is highly desirable.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication abilities.
- Ability to work independently and manage priorities effectively in a remote environment.
- Relevant security certifications such as GIAC, OSCP, or CISSP are a significant advantage.
Senior Security Operations Center (SOC) Analyst
Posted 1 day ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts from various sources, including SIEM, IDS/IPS, and EDR solutions.
- Analyze security incidents to determine scope, impact, and root cause.
- Lead the response to security incidents, including containment, eradication, and recovery phases.
- Conduct threat hunting activities to proactively identify malicious activity.
- Develop and refine threat detection rules and signatures.
- Stay current with the latest cybersecurity threats, vulnerabilities, and attack techniques.
- Document incident details, actions taken, and lessons learned.
- Collaborate with incident response teams and other IT security functions.
- Mentor junior SOC analysts and provide technical guidance.
- Contribute to the improvement of SOC tools and processes.
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 4+ years of experience in a Security Operations Center (SOC) or similar cybersecurity role.
- In-depth knowledge of SIEM technologies (e.g., Splunk, QRadar, LogRhythm).
- Hands-on experience with EDR solutions and network security monitoring tools.
- Proficiency in analyzing various log sources and network traffic.
- Strong understanding of cyber kill chains, MITRE ATT&CK framework, and threat intelligence.
- Relevant security certifications such as GCIH, GCIA, CISSP, or CEH are highly desirable.
- Excellent analytical and problem-solving skills.
- Strong written and verbal communication abilities.
- Ability to work effectively in a 24/7 operational environment if required.
Be The First To Know
About the latest Security operations Jobs in Bahrain !
Senior Security Operations Center (SOC) Analyst
Posted 1 day ago
Job Viewed
Job Description
Key Responsibilities:
- Lead the monitoring of security alerts from various sources, including SIEM, IDS/IPS, EDR, and threat intelligence feeds.
- Perform advanced threat hunting to proactively identify sophisticated threats that evade automated detection.
- Investigate security incidents, conduct forensic analysis, and develop detailed incident response reports.
- Manage and optimize SIEM, SOAR, and other security monitoring tools to enhance detection capabilities.
- Develop and refine incident response playbooks and standard operating procedures (SOPs).
- Collaborate with internal IT teams and external partners to contain and eradicate threats.
- Stay current with emerging cyber threats, vulnerabilities, and attack vectors.
- Provide mentorship and guidance to junior SOC analysts.
- Contribute to the continuous improvement of SOC processes, tools, and capabilities.
- Participate in security awareness initiatives and provide technical expertise to other departments.
- Analyze security trends and provide actionable insights to strengthen the organization's security posture.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field. Relevant certifications such as GCIH, GCIA, ECIH, OSCP, or similar are highly valued.
- Minimum of 5-7 years of experience working in a Security Operations Center (SOC) or as a cybersecurity analyst, with at least 2 years in a senior or lead capacity.
- Extensive experience with SIEM platforms (e.g., Splunk, QRadar, Sentinel), EDR solutions, and threat intelligence platforms.
- Proficiency in network protocols, operating system security, and common attack frameworks (e.g., MITRE ATT&CK).
- Strong understanding of malware analysis, digital forensics, and incident response methodologies.
- Excellent analytical, problem-solving, and critical thinking skills.
- Ability to work independently and effectively manage tasks in a fully remote setting.
- Exceptional written and verbal communication skills, with the ability to document complex technical findings clearly.
- Experience with scripting languages (e.g., Python, PowerShell) for automation is a plus.
- Demonstrated ability to remain calm and effective under pressure during critical security incidents.
This is a premier opportunity for an accomplished SOC professional to join a cutting-edge cybersecurity team, make a significant impact, and enjoy the flexibility of a fully remote role.
Senior Security Operations Center (SOC) Analyst
Posted 1 day ago
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and events from various sources, including SIEM, IDS/IPS, EDR, and threat intelligence feeds.
- Analyze security incidents to determine the scope, impact, and root cause.
- Lead incident response activities, including containment, eradication, and recovery.
- Develop and refine detection rules, correlation logic, and playbooks for security tools.
- Conduct threat hunting to proactively identify and mitigate advanced persistent threats (APTs).
- Perform forensic analysis of compromised systems and digital evidence.
- Stay current with the latest cybersecurity threats, vulnerabilities, and attack vectors.
- Contribute to the development and improvement of SOC policies, procedures, and workflows.
- Mentor and provide guidance to junior SOC analysts.
- Collaborate with other security teams, IT operations, and business units to address security concerns.
- Generate regular reports on security incidents, trends, and key performance indicators (KPIs).
- Participate in security awareness training and incident response drills.
- Evaluate and recommend new security technologies and tools.
- Ensure compliance with relevant security standards and regulations.
- Maintain comprehensive documentation of security incidents and investigations.
- Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent practical experience.
- Minimum of 6 years of experience in a Security Operations Center (SOC) environment, with at least 2 years in a senior or lead analyst role.
- In-depth knowledge of SIEM platforms (e.g., Splunk, QRadar, ArcSight), EDR solutions, and network security technologies.
- Strong understanding of cyber kill chains, MITRE ATT&CK framework, and common attack methodologies.
- Experience with threat intelligence platforms and analysis.
- Proficiency in incident response, forensic analysis, and malware analysis.
- Relevant security certifications such as GCIA, GCIH, SC-900, CySA+, or equivalent are highly desirable.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong communication and collaboration abilities.
- Ability to work under pressure and manage critical incidents effectively.
Remote Security Operations Center (SOC) Analyst
Posted 2 days ago
Job Viewed
Job Description
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, or a related field, or equivalent experience.
- Proven experience in a SOC or similar security operations role.
- Familiarity with SIEM, IDS/IPS, EDR, and other security monitoring tools.
- Strong understanding of TCP/IP, network protocols, and operating systems (Windows, Linux).
- Excellent analytical, problem-solving, and critical thinking skills.
- Ability to work independently and manage time effectively in a remote setting.
- Relevant security certifications (e.g., Security+, CySA+, GCIH) are a strong asset.