Description:We are seeking a seasoned cybersecurity professional to join our Security Operations Center (SOC) as a Level 2 SOC Analyst. You will serve as the first point of advanced analysis for security events – performing deep‑dive investigations, validating and containing threats. The ideal candidate has a proven track record in a 24×7 SOC environment, solid experience with SIEM/EDR/IDS and other SOC technologies, and the ability to think critically under pressure. Responsibilities:Perform second‑level triage and analysis of security alerts raised by L1 analysts or automated detections. Investigate, validate, and contain security incidents, coordinating with L3 or IR teams when necessary. Conduct proactive threat hunting and retrospective analysis using long‑term storage (LTS) data. Create and tune detection rules, playbooks, and use‑cases to improve SOC efficacy. Mentor and provide technical guidance to L1 analysts, contributing to continuous knowledge transfer. Lead weekly service‑review meetings with clients and conduct post‑incident debriefs with client‑side executives. Rotating shifts are mandatory, as per industry‑standard SOC operations; you will be scheduled on a 24×7 roster (including nights, weekends, and public holidays) to ensure continuous coverage. Required:Language/Nationality: Fluent English & Arabic; Saudi national (per local regulations). Bachelor’s degree in cybersecurity, information technology, or a closely related field; a postgraduate degree is a plus. Apart from entry‑level certifications such as Comp TIA Security+, candidates must have at least one intermediate or advanced professional certification in cybersecurity, incident response, or digital forensics (include verification code/link in your CV). Examples: GCIA, GCIH, GCFA, GNFA, OSCP, GSEC, CySA+, CCSP, Splunk Enterprise Security Admin.3-4 years of hands‑on experience working in a SOC or incident‑response capacity. Hands‑on experience with security technologies such as SIEM, XDR, EDR, IDS/IPS, SOAR, and threat‑intelligence platforms. Strong understanding of network protocols, operating systems (Windows, Linux, mac OS). Work experience with cybersecurity controls, frameworks, and guidelines such as Cyber Kill Chain, MITRE ATT&CK, etc. Refined public speaking and presentation skills; able to clearly communicate technical findings to non‑technical stakeholders and client‑side executives. Proven self‑motivation and commitment to continuous professional development and certification. Excellent analytical, problem‑solving, and collaboration skills. Strong plus to have:Experience developing or tuning detection content, response playbooks, automation, SOC integrations. Work experience with cybersecurity controls, frameworks, and guidelines, with primary emphasis on local regulations such as NCA ECC, NCA CCC, NCA MSOC, SAMA CSF, and other regional directives, as well as international standards (e.g., NIST, ISO/IEC 27001, PCI‑DSS, HIPAA, etc). Exposure to cloud‑security monitoring (AWS, Azure, GCP) and containerized environments. If you are passionate about defending complex environments and ready to grow in a fast‑paced MSSP setting, apply today and become part of our mission to keep our customers secure.