
Nice One
SOC Team Leader
- Permanent
- Riyadh, Saudi Arabia
- Experience 5 - 10 yrs
Job expiry date: 03/06/2026
Job overview
Date posted
19/04/2026
Location
Riyadh, Saudi Arabia
Salary
SAR 20,000 - 30,000 per month
Compensation
Comprehensive package
Job description
The SOC Team Leader within the Cyber Security Department in Riyadh, Saudi Arabia is responsible for leading Security Operations Center (SOC) operations to detect, investigate, and respond to cybersecurity incidents while improving monitoring capabilities, processes, and tool effectiveness. The role involves operational leadership, incident response management, threat hunting, threat intelligence utilization, and cross-functional coordination with IT, engineering, risk, compliance, and business teams. The position requires oversight of day-to-day SOC operations including alert monitoring, triage, investigation, escalation, and incident response according to defined SLAs and incident classification procedures. The SOC Team Leader maintains and improves detection capabilities by tuning SIEM rules, integrating telemetry sources, validating alerts, and optimizing EDR platforms, network detection tools, cloud security tools, and threat intelligence solutions. The role involves proactive threat hunting, identifying attacker behaviors, analyzing emerging risks, and implementing detection and prevention improvements. Responsibilities include developing and maintaining runbooks, playbooks, escalation paths, and SOC operational processes to ensure repeatable and auditable incident handling. The role also involves producing operational and executive reporting using SOC metrics such as MTTR, MTTD, alert volumes, false positive rates, and incident trends. The SOC Team Leader manages vendor relationships, integrates MDR solutions, ensures regulatory compliance, participates in audits, and supports hybrid, cloud, and on-premises environments including AWS, Azure, and GCP while improving SOC operational workflows and automation.
Required skills
Key responsibilities
- Lead, mentor, and develop SOC analysts across shifts while ensuring coverage, capability development, and consistent use of runbooks, playbooks, and detection procedures
- Oversee day-to-day SOC operations including security monitoring, alert triage, investigation, escalation, and incident response in accordance with SLAs and incident classification standards
- Manage and coordinate cybersecurity incident response activities including containment, eradication, recovery, root cause analysis, and post-incident reporting
- Maintain and improve detection capabilities by tuning SIEM rules, integrating telemetry sources, validating alerts, and optimizing EDR platforms and network detection tools
- Conduct proactive threat hunting using threat intelligence to identify emerging risks, attacker behaviors, and detection gaps
- Develop, update, and enforce SOC processes, runbooks, escalation paths, and playbooks for consistent and auditable incident handling
- Coordinate with IT, engineering, risk, compliance, and business teams to communicate incidents and implement remediation actions
- Produce operational and executive reports including SOC metrics such as MTTR, MTTD, alert volumes, false positive rates, and incident trends
- Manage vendor relationships including MDR providers, threat intelligence platforms, and security tooling integrations
- Ensure SOC operations comply with internal policies, regulatory requirements, and security standards while supporting audits and readiness activities
- Support cloud and hybrid security monitoring across AWS, Azure, and GCP environments
- Drive continuous improvement of SOC workflows, automation, and operational processes
Experience & skills
- Hold a Bachelor’s degree in Computer Science, Information Security, or related field or equivalent practical experience
- Demonstrate 5+ years of experience in security operations, incident response, or cybersecurity roles
- Possess at least 2 years of supervisory or team lead experience within SOC or security operations environments
- Demonstrate hands-on experience with SIEM platforms including Splunk, Elastic, or QRadar
- Show experience working with EDR platforms, network detection tools, and security telemetry sources
- Demonstrate expertise in incident response, digital forensics, and threat hunting
- Possess knowledge of cloud security across AWS, Azure, and GCP environments
- Hold professional certifications such as GCIA, GCIH, CISSP, CISM, or equivalent preferred
- Demonstrate experience working in on-premises, cloud, and hybrid environments
- Show proficiency in English language with Arabic considered a plus
- Demonstrate ability to support rotating shifts, on-call duties, and incident response outside business hours
- Possess legal right to work in the hiring country