
Takamol
SOC Lead
- Permanent
- Riyadh, Saudi Arabia
- Experience 2 - 5 yrs
Job expiry date: 07/05/2026
Job overview
Date posted
23/03/2026
Location
Riyadh, Saudi Arabia
Salary
SAR 20,000 - 30,000 per month
Compensation
Comprehensive package
Job description
The SOC Lead (Security Operations Center & Incident Response) is responsible for leading advanced cybersecurity monitoring, detection, and response operations within a Security Operations Center environment in Riyadh, Saudi Arabia. The role involves overseeing security monitoring across SIEM platforms such as Splunk, QRadar, and ArcSight, as well as EDR, Firewalls, Azure environments, Proxy, IPS, DLP, and cloud-native security tools. The position requires developing and fine-tuning detection use cases, correlation rules, and dashboards, and conducting proactive threat hunting using MITRE ATT&CK and threat intelligence sources. The SOC Lead performs deep-dive incident investigations across endpoints, networks, Linux and Windows servers, including malware analysis, digital forensics, reverse engineering, and root cause analysis (RCA) to identify vulnerabilities and recommend remediation actions. The role includes leading containment, eradication, and recovery efforts for high-severity incidents, as well as conducting forensic analysis of compromised systems. Responsibilities extend to correlating threat intelligence with telemetry, producing intelligence reports, and strengthening detection and response capabilities. The SOC Lead mentors SOC analysts (L1/L2), develops playbooks, runbooks, and escalation procedures, and collaborates with IT, Cloud, and GRC teams to ensure compliance with regulatory frameworks such as GDPR, PCI-DSS, HIPAA, and NCA. The role requires expertise in frameworks including MITRE ATT&CK, Cyber Kill Chain, and Diamond Model, as well as scripting and automation using Python, PowerShell, and Bash. The position also supports audit, compliance, and reporting activities while ensuring SOC processes align with industry best practices and regulatory requirements.
Required skills
Key responsibilities
- Lead advanced security monitoring of events, logs, and alerts across SIEM, EDR, Firewalls, Azure, Proxy, IPS, DLP, and cloud-native security tools
- Develop and fine-tune detection use cases, correlation rules, and dashboards to enhance threat detection capabilities
- Conduct proactive threat hunting using MITRE ATT&CK and threat intelligence sources to identify emerging threats
- Perform deep-dive incident investigations including malware analysis, digital forensics, reverse engineering, and root cause analysis across endpoints, networks, Linux and Windows servers
- Lead containment, eradication, and recovery efforts for high-severity cybersecurity incidents
- Conduct forensic analysis of compromised endpoints, servers, and network devices
- Correlate threat intelligence with internal and external telemetry and provide actionable intelligence reports
- Mentor and train SOC analysts (L1/L2) and develop playbooks, runbooks, and escalation procedures
- Collaborate with IT, Cloud, and GRC teams to ensure compliance with regulatory frameworks and security standards
- Support audit, compliance, and reporting activities with accurate incident records and metrics
Experience & skills
- Hold a Bachelor’s degree in Computer Science, Cybersecurity, Information Security, or related field
- Demonstrate 4.5–6.5 years of experience in cybersecurity with at least 3 years in SOC or DFIR leadership roles
- Exhibit hands-on experience with SIEM platforms such as Splunk, QRadar, and ArcSight
- Possess strong knowledge of EDR, Proxy, Firewalls, IPS, DLP, Azure, and cloud-native security tools
- Demonstrate experience in malware analysis, digital forensics, and reverse engineering
- Show proficiency in scripting and automation using Python, PowerShell, and Bash
- Exhibit deep understanding of cybersecurity frameworks including MITRE ATT&CK, Cyber Kill Chain, and Diamond Model
- Demonstrate knowledge of regulatory frameworks such as GDPR, PCI-DSS, HIPAA, and NCA
- Hold or pursue professional certifications such as GCIA, GMON, GSOM, GCIH, or GCFA as preferred
- Demonstrate ability to handle high-severity incidents under pressure and deliver effective incident response
- Exhibit strong analytical and problem-solving capabilities in cybersecurity operations
- Demonstrate leadership and mentoring capabilities for SOC teams and collaboration with cross-functional IT and business units