
Accenture
Security Operations Center (SOC) Analyst
- Permanent
- Riyadh, Saudi Arabia
- Experience 0 - 2 yrs
Job expiry date: 21/02/2026
Job overview
Date posted
07/01/2026
Location
Riyadh, Saudi Arabia
Salary
SAR 15,000 - 20,000 per month
Compensation
Salary only
Job description
Accenture Cyber Defense SOC Level 1 Analyst role based in Riyadh, Saudi Arabia as first line of defense responsible for monitoring, detecting, and triaging security events in a fast-paced environment using cutting-edge tools and collaborating with global teams to protect clients from evolving cyber threats. Responsibilities include monitoring and analyzing security alerts from SIEM, EDR and other security platforms; performing initial triage and classification of incidents based on severity and impact; escalating confirmed incidents to Level 2/Incident Response teams following defined playbooks; documenting all activities in ticketing systems and maintaining accurate incident records; supporting phishing investigations, malware analysis and basic threat hunting activities; and collaborating with cross-functional teams to ensure timely resolution and reporting. Required qualifications include Bachelorās degree in Computer Science, Cybersecurity or related field; minimum 1 year experience in cybersecurity operations or IT security; familiarity with SIEM tools such as Splunk, QRadar and Sentinel and basic networking concepts; understanding of common attack vectors, malware indicators and security best practices; and basic knowledge of Windows/Linux OS, firewalls and endpoint security. Preferred skills include intermediate proficiency in Incident Management and Threat Analysis, knowledge of Risk Assessment, Security Policy Development and Vulnerability Management, and industry certifications such as CompTIA Security+, CEH or Splunk Fundamentals, with the role requiring ability to work in a 24x7 environment.
Required skills
Key responsibilities
- Monitor and analyze security alerts from SIEM, EDR, and other security platforms
- Perform initial triage and classification of incidents based on severity and impact
- Escalate confirmed incidents to Level 2 and Incident Response teams following defined playbooks
- Document all activities in ticketing systems and maintain accurate incident records
- Support phishing investigations, malware analysis, and basic threat hunting activities
- Collaborate with cross-functional teams to ensure timely resolution and reporting
- Protect clients from evolving cyber threats by operating as first line of defense in cybersecurity operations
Experience & skills
- Hold a Bachelorās degree in Computer Science, Cybersecurity, or a related field
- Bring a minimum of 1 year of experience in cybersecurity operations or IT security
- Demonstrate familiarity with SIEM tools such as Splunk, QRadar, and Sentinel and demonstrate basic networking concepts knowledge
- Demonstrate understanding of common attack vectors, malware indicators, and security best practices
- Demonstrate basic knowledge of Windows OS, Linux OS, firewalls, and endpoint security
- Escalate incidents to Level 2/Incident Response teams using defined playbooks and document activities in ticketing systems maintaining accurate incident records
- Support phishing investigations, malware analysis, and basic threat hunting activities and collaborate with cross-functional teams for timely resolution and reporting
- Demonstrate intermediate proficiency in Incident Management and Threat Analysis (preferred)
- Demonstrate knowledge of Risk Assessment, Security Policy Development, and Vulnerability Management (preferred)
- Hold industry certifications such as CompTIA Security+, CEH, or Splunk Fundamentals (preferred)