18 Soc Engineer jobs in Egypt
SOC Engineer
Posted today
Job Viewed
Job Description
- Responsible for Monitoring & Tracking Incidents/Alerts 24x7
- Monitor & analyst performance by investigating incoming events using SOC-available tools.
- Create Use Cases make sure all threat being tracked
- Maintain a direct working relationship with the SOC.
- Provide recommendations in tuning and optimization of security systems, SOC security procedures and policies.
- Build incident project plans for events and provide responses
- To escalate timely when the SLA for alerting is not met.
- To generate the daily reports, weekly reports and monthly reports on time.
- Identify and validate threats by data analysis.
- Bachelor's degree in Computer Science, Information Systems, or a related field
- Over 2 years of experience as a SOC Engineer
- Certifications such as CEH, CompTIA Security, or CCNA
SOC Engineer
Posted today
Job Viewed
Job Description
Flash is an early-stage Cairo-based fintech aiming to support our society's financial well-being, one person at a time.
Flash has raised a $6M seed round from leading international investors and is approved by the Central Bank of Egypt in partnership with Banque Misr.
Our founding team has deep local and international experience working at top consumer-facing technology companies.
We are seeking a Security Operations Engineer to own the management and operation of our centralized logging and Security Information and Event Management (SIEM) platform. This role ensures that logs from critical systems are collected, monitored, and retained in compliance with security and regulatory requirements (SOC 2, PCI DSS, ISO The engineer will work closely with teams to detect threats, investigate incidents, and provide evidence for audits.
Key ResponsibilitiesLog Management & Retention
Configure and maintain log collection from servers, endpoints, applications, and cloud environments.
- Ensure retention policies are enforced.
- Regularly review log completeness and integrity.
SIEM Administration
Manage SIEM platform (e.g., Wazuh, CrowdStrike Falcon).
- Develop and maintain dashboards, alerts, and correlation rules.
- Tune alerts to minimize false positives.
Security Monitoring & Detection
Monitor SIEM alerts for indicators of compromise, misuse, or anomalies.
- Investigate and escalate security incidents as required.
Compliance & Audit Support
Provide logs, reports, and screenshots of configurations as audit evidence.
- Support User Access Reviews (UARs) and log retention evidence for SOC 2.
- Document processes for log and SIEM management.
Incident Response
Support forensic investigations through log correlation and analysis.
- Assist in root cause analysis and incident postmortems.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or related field (or equivalent experience).
- 3+ years experience in SIEM administration and log management.
- Hands-on experience with at least one SIEM platform (Wazuh, ELK/Opensearch, CrowdStrike Falcon).
- Strong knowledge of log formats (syslog, JSON, Windows Event Logs).
- Familiarity with compliance frameworks (SOC 2, PCI DSS, ISO
- Understanding of networking, Linux/Windows administration, and security concepts.
- Experience with scripting/automation.
- Strong analytical and problem-solving skills.
sAz5xPeObS
Jr SOC Engineer
Posted today
Job Viewed
Job Description
- Fixed-term contract
- Full-time
- Less than 2 years of experience (Entry level)
- Bachelor degree
- IT Specialist
JOB PURPOSE:
The Junior SOC Engineer plays a key role in supporting the day-to-day cybersecurity monitoring and incident response activities within the organization. This position is responsible for operating and maintaining security systems, responding to threats, and ensuring timely investigation and remediation of incidents. The role partners closely with the Head of Cyber Security and OT Systems Managers to support the advancement of the company's cybersecurity maturity, contributing to proactive defense and continuous improvement of the organization's security posture.
ProfileRESPONSIBILITIES/DUTIES
Threat Monitoring & Incident Response:
- Monitor and analyze security alerts from multiple sources, including SIEM, firewalls, IDS/IPS, and antivirus tools.
- Investigate and assist in responding to security incidents, such as malware infections, phishing attacks, and unauthorized access.
- Escalate high-priority incidents to Cybersecurity Engineer based on severity and defined playbooks.
- Assist in containment, eradication, and recovery efforts during active incidents.
Log Analysis & SIEM Tuning:
- Analyzing event logs from endpoints, servers, applications, and network devices to identify anomalies and indicators of compromise (IOCs).
- Tune SIEM use cases and correlation rules to reduce false positives and improve detection accuracy.
- Maintain and enrich threat detection content with relevant threat intel and attack patterns (e.g., MITRE ATT&CK framework).
Access Control & Policy Enforcement:
- Assist in enforcing access controls and security policies.
- Work alongside IT teams to uphold system and network security standards.
Compliance & Risk Management:
- Support compliance with relevant cybersecurity frameworks (e.g., ISO 27001, NIST, GDPR).
- Assist in audits, documentation, and risk assessments.
Collaboration & Reporting:
- Liaise with IT, security, and business teams to apply effective security controls.
- Contribute to the preparation of reports on incidents, Cybersecurity system status.
Continuous Improvement & Research:
- Stay informed on evolving cybersecurity threats and industry developments.
- Recommend and assist in implementing security improvements and best practices.
Additional Responsibilities:
- Perform other related duties as assigned in support of overall cybersecurity operations.
ESSENTIAL QUALIFICATIONS, KNOWLEDGE & EXPERIENCE
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, IT, Engineering, or a related field.
- Industry certifications (CompTIA Security+, CEH, eJPT, ECIR, or GMON) are preferred.
- Fluency in English and Arabic; French is a plus.
Knowledge:
- Strong foundation in cybersecurity principles and threat landscapes.
- Understanding of security tools: SIEM, antivirus, IDS/IPS, endpoint protection.
- Knowledge of networking protocols (TCP/IP, DNS, SSL/TLS) and basic system hardening.
- Exposure to Windows/Linux operating systems; scripting (e.g., Python, PowerShell) is a plus.
Experience:
- 0–2 years of relevant experience in cybersecurity or IT/network security.
- Internship or academic project experience in incident response or monitoring is desirable.
- Exposure to security tools or platforms is advantageous.
DESIRED BEHAVIORS & EXPERIENCES
- Curiosity and Continuous Learning: Eager to develop cybersecurity knowledge and stay current with trends and technologies.
- Analytical Thinking: Strong problem-solving skills and attention to detail in identifying and investigating threats.
- Responsibility and Integrity: Demonstrates a strong ethical foundation, particularly around handling sensitive information.
- Adaptability: Works well under pressure, with the ability to prioritize and multitask effectively in dynamic environments.
- Collaboration: Team-oriented mindset with a willingness to share knowledge and support peers.
- Initiative: Proactive in identifying issues, suggesting improvements, and seeking solutions independently.
- Communication: Communicates clearly and effectively with both technical and non-technical stakeholders.
Location
Address
Cairo, Cairo, Egypt
SOC Engineer L2
Posted today
Job Viewed
Job Description
Job Summary:
As an SOC Engineer (Level 2), you will play a critical role in detecting, investigating, and responding to security incidents. You will be responsible for advanced monitoring, incident handling, and threat hunting, while continuously improving detection and response capabilities to protect the organization's infrastructure.
Job Description:
· Continuously monitor SIEM and other security tools to identify suspicious activity in real time.
· Triage, analyze, and respond to alerts from multiple sources (EDR, IDS/IPS, NDR, etc.).
· Integrate threat intelligence (internal & external) into detection logic and enrich alert context.
· Lead end-to-end incident response: containment, eradication, root cause analysis, lessons learned, and reporting.
· Develop and fine-tune detection rules, playbooks, and automation scripts in SOAR and EDR platforms.
· Leverage generative AI to enhance autonomous detection and response workflows, improving accuracy and scalability.
· Proactively hunt for threats using log data, endpoint telemetry, and threat intelligence.
· Research emerging attack techniques (TTPs) and integrate findings into SOC strategy.
· Build and maintain detection rules mapped to MITRE ATT&CK across endpoint, network, and application layers.
· Maintain detection coverage maps and tune alerts for improved signal-to-noise ratio.
Qualifications & Skills:
- Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience).
- Minimum of 2 years of hands-on experience in a SOC environment or related security operations role.
- Hands-on experience with SIEM platforms (Splunk, IBM QRadar, FortiSIEM, etc.).
- Strong analytical and problem-solving skills.
- Solid knowledge of threat intelligence and detection methodologies.
- Understanding of network, endpoint, and web attack techniques and detection methods.
- Practical experience with EDR platforms.
- Strong understanding of TCP/IP, common protocols, and core security controls (firewalls, IDS/IPS, NAC, VPN).
- Incident investigation experience (containment, eradication, RCA, and reporting).
- Excellent written and verbal communication skills for technical and non-technical audiences.
Preferred :
- Industry certifications such as GCIH, GCIA, GCFA, OSCP.
- Familiarity with SOAR platforms and scripting (Python, PowerShell) for automation.
- Experience with MITRE ATT&CK mapping, purple-team exercises, or threat hunting.
- Prior experience in a 24×7 SOC environment with structured shift handovers.
Junior SOC engineer
Posted today
Job Viewed
Job Description
1 / 2
Security Ops Engineer
Job Description
SecOps engineers are responsible for protecting an organization's infrastructure, applications and data from security threats. They use their expertise in security standards and best practices as well as network architecture to develop and implement effective security solutions.
*This role will need to support both on daily IT security Ops and on embedding security standards in new developments. The required profile should be strong in one of these 2 domains (daily operations/development integration), and should have a fundamental understanding & potential to learn the full scope of the other, so that time allocation between the 2 domains can be flexible.
Responsibilities
· Implement and manage all CGC's security solutions in compliance with CBE Cybersecurity framework.
· Support to analyze risk landscape of CGC to research potential weaknesses and find ways to counter them
· Find cost-effective solutions to cybersecurity problems
· Understand software, hardware, and network needs while adjusting them according to our business environment
· Be an effective part of the team who will develop & implement use cases, best practices and security standards for the organization
· Perform a wide range of Security administration duties including installations, debugging, maintenance, upgrades, and general support for security and network equipment such as firewalls, EDR, NDR, XDR, PAM, DAM, SIEM, vulnerability management, etc.
· Test company software, firmware against defined security policies and seek improvements on a continuous basis.
· Assist fellow employees with cybersecurity, software, hardware or IT needs
· Operate organization's SOC to identity, report and mitigate possible threats or cybersecurity incidents, and recover the system to normal condition if necessary.
· Provide emergency 24 x 7 on-call support on a rotating basis.
· Backup security configuration.
· Perform regular disaster recovery testing, including securities activities.
Job Requirements
· Bachelor's degree in Computer Science, Communications Engineering or equivalent.
· 4-6 years total experience relevant to Cybersecurity
· Hands-on experience in security equipment and solutions (e.g. VPN, Firewalls, NAC, EDR, and DLP).
· Ability to prioritize projects
· Comfortable working in a fast-paced environment
· Excellent communication skills
· Preferred certifications such as ISO27001, CISSP, GSEC, CEH, or CISM desired
· An understanding of best practices and how to implement them at a business-wide level
· Critical thinking skills and the ability to solve problems as they arise
· Preferred basic coding skills, such as HTML, CSS, and other languages
2 / 2
Experience
· At least 3 years of experience in the cybersecurity industry
· High sense of responsibility and ownership, acting like an owner in what you do.
· Exceptional communication and presentation skills
· Strong analytical skills
· Able to multi-task efficiently under time pressure
· Able to work with cutting-edge technology and assimilate information rapidly
· Proven experience in managing support-focused team culture
· Fluent in English is highly preferred.
· Proven ability to work in teams
send your resume to
Jr SOC Engineer
Posted today
Job Viewed
Job Description
Job Purpose
The Junior SOC Engineer plays a key role in supporting the day-to-day cybersecurity monitoring and incident response activities within the organization. This position is responsible for operating and maintaining security systems, responding to threats, and ensuring timely investigation and remediation of incidents. The role partners closely with the Head of Cyber Security and OT Systems Managers to support the advancement of the company's cybersecurity maturity, contributing to proactive defense and continuous improvement of the organization's security posture.
Responsibilities/Duties
Profil de candidat recherché :
Threat Monitoring & Incident Response
- Monitor and analyze security alerts from multiple sources, including SIEM, firewalls, IDS/IPS, and antivirus tools.
- Investigate and assist in responding to security incidents, such as malware infections, phishing attacks, and unauthorized access.
- Escalate high-priority incidents to Cybersecurity Engineer based on severity and defined playbooks.
- Assist in containment, eradication, and recovery efforts during active incidents.
Log Analysis & SIEM Tuning
- Analyzing event logs from endpoints, servers, applications, and network devices to identify anomalies and indicators of compromise (IOCs).
- Tune SIEM use cases and correlation rules to reduce false positives and improve detection accuracy.
- Maintain and enrich threat detection content with relevant threat intel and attack patterns (e.g., MITRE ATT&CK framework).
Access Control & Policy Enforcement
- Assist in enforcing access controls and security policies.
- Work alongside IT teams to uphold system and network security standards.
Compliance & Risk Management
- Support compliance with relevant cybersecurity frameworks (e.g., ISO 27001, NIST, GDPR).
- Assist in audits, documentation, and risk assessments.
Collaboration & Reporting
- Liaise with IT, security, and business teams to apply effective security controls.
- Contribute to the preparation of reports on incidents, Cybersecurity system status.
Continuous Improvement & Research
- Stay informed on evolving cybersecurity threats and industry developments.
- Recommend and assist in implementing security improvements and best practices.
Additional Responsibilities
- Perform other related duties as assigned in support of overall cybersecurity operations.
Qualifications
ESSENTIAL QUALIFICATIONS, KNOWLEDGE & EXPERIENCE
- Bachelor's degree in Cybersecurity, Computer Science, IT, Engineering, or a related field.
- Industry certifications (CompTIA Security+, CEH, eJPT, ECIR, or GMON) are preferred.
- Fluency in English and Arabic; French is a plus.
Knowledge
- Strong foundation in cybersecurity principles and threat landscapes.
- Understanding of security tools: SIEM, antivirus, IDS/IPS, endpoint protection.
- Knowledge of networking protocols (TCP/IP, DNS, SSL/TLS) and basic system hardening.
- Exposure to Windows/Linux operating systems; scripting (e.g., Python, PowerShell) is a plus.
Experience
- 0–2 years of relevant experience in cybersecurity or IT/network security.
- Internship or academic project experience in incident response or monitoring is desirable.
- Exposure to security tools or platforms is advantageous.
Desired Behaviors & Experiences
- Curiosity and Continuous Learning: Eager to develop cybersecurity knowledge and stay current with trends and technologies.
- Analytical Thinking: Strong problem-solving skills and attention to detail in identifying and investigating threats.
- Responsibility and Integrity: Demonstrates a strong ethical foundation, particularly around handling sensitive information.
- Adaptability: Works well under pressure, with the ability to prioritize and multitask effectively in dynamic environments.
- Collaboration: Team-oriented mindset with a willingness to share knowledge and support peers.
- Initiative: Proactive in identifying issues, suggesting improvements, and seeking solutions independently.
- Communication: Communicates clearly and effectively with both technical and non-technical stakeholders.
SOC Integration Engineer/Senior Engineer
Posted today
Job Viewed
Job Description
Ensure that all log sources are reporting to the SIEM platform in order to maintain the availability of the logs.
Ensure all the integrated assets are reporting to their relevant solution (such as Data Activity Monitor, File Integrity Monitor, Firewall Monitor, SOAR, or TIP)
Monitor the log sources to make sure the log sources are sending proper logs that are used to identify incidents for reporting, detecting incidents and/or contextual data by designing and creating dashboards & periodical reports to ensure that all the integrations are functional and in healthy posture.
Implement and fine tune use cases over different SOC technologies (including but not limited to SIEM) as required by Security Intel team to identify incidents.
Implement Runbooks & automations for detection and response over SOAR platform.
Maintain & enhance TIP technology according to Threat Intel team operation requirements.
Integrate new commercial and non-commercial Threat Intel feeds with the TIP solution to enhance SOC detections, identifications, investigation and response.
Recommend, develop and release new integrations to maximize the benefits and efficiencies from a SOAR platform.
Generate reports as required by SOC management teams to be presented to the management to be used in further data analysis.
Work with IT systems owners to establish SIEM & SOAR technologies integrations to meet the strategic goals of identifying security incidents by defining Use Cases.
Deployment and Development of customized and non-customized SIEM connectors for supported and unsupported SOC log sources, and modify configuration files to achieve the full integrations with different log sources.
Develop scripts (Java, Python, Bash) whenever required for automating SOAR responses and SIEM log collection.
Fine tune collected log events to minimize false positive alerts.
Prepare reports to ensure compliance with the SOC requirements from regulatory and security perspectives.
Ensure effective records of log resources and SOC relevant platforms, to maintain the integrity and availability of all evidences used for incident response
Manage the continuous improvement of systems engineering processes and activities to enhance the efficiency and effectiveness of reporting and alerting.
Research, analyse and understand log sources utilized for the purpose of security monitoring, particularly security and networking devices (such as firewalls, routers, anti-virus products, proxies, EDR, operating systems, etc…), in order to increase effectiveness of the log correlation.
Provide technical inputs to management during proof-of-concept reviews for new security products to ensure alignment with the set policies and guidelines.
Provide technical guidance to the Security teams and/or the lines of business during investigations or incident response in order to help in the investigation and root cause analysis.
Requirements
• Bachelor's degree of Engineering, Computer Science or equivalent.
• Minimum 3 - 6 years of experience in SIEM Technology platforms years of experience for senior)
• Working knowledge of Information Security concepts and practices
• Very Good experience of the SIEM, SOAR, TIP, DAM and FIM solutions
• Knowledge of Data Activity Monitor and File Integrity Monitor solutions
• General network knowledge, TCP/IP Troubleshooting
• Familiarity with system log information and what it means
• Understanding of common network services (web, mail, DNS, DHCP, authentication)
• Strong shell scripting experience using Bash, and Python
• Knowledge of systems metrics and performance monitoring
• Experience with virtual environments and containers (Docker, LXC)
• Strong Linux and Windows knowledge
• Good understanding of Database concepts
• Recommended –one or more of- the below certifications:
o SIEM Vendor Related Certificates
o SOAR Vendor Related Certificates
o TIP vendor related certificates
o SANS Global Information Assurance Certification (GIAC)
o EC-Council – CEH
o CISM
o CISSP
• Very good command of English and Arabic language
• Good communication skills
Be The First To Know
About the latest Soc engineer Jobs in Egypt !
SOC Integration Engineer and Senior Engineer
Posted today
Job Viewed
Job Description
Ensure that all log sources are reporting to the SIEM platform in order to maintain the availability of the logs.
Ensure all the integrated assets are reporting to their relevant solution (such as Data Activity Monitor, File Integrity Monitor, Firewall Monitor, SOAR, or TIP)
Monitor the log sources to make sure the log sources are sending proper logs that are used to identify incidents for reporting, detecting incidents and/or contextual data by designing and creating dashboards & periodical reports to ensure that all the integrations are functional and in healthy posture.
Implement and fine tune use cases over different SOC technologies (including but not limited to SIEM) as required by Security Intel team to identify incidents.
Implement Runbooks & automations for detection and response over SOAR platform.
Maintain & enhance TIP technology according to Threat Intel team operation requirements.
Integrate new commercial and non-commercial Threat Intel feeds with the TIP solution to enhance SOC detections, identifications, investigation and response.
Recommend, develop and release new integrations to maximize the benefits and efficiencies from a SOAR platform.
Generate reports as required by SOC management teams to be presented to the management to be used in further data analysis.
Work with IT systems owners to establish SIEM & SOAR technologies integrations to meet the strategic goals of identifying security incidents by defining Use Cases.
Deployment and Development of customized and non-customized SIEM connectors for supported and unsupported SOC log sources, and modify configuration files to achieve the full integrations with different log sources.
Develop scripts (Java, Python, Bash) whenever required for automating SOAR responses and SIEM log collection.
Fine tune collected log events to minimize false positive alerts.
Prepare reports to ensure compliance with the SOC requirements from regulatory and security perspectives.
Ensure effective records of log resources and SOC relevant platforms, to maintain the integrity and availability of all evidences used for incident response
Manage the continuous improvement of systems engineering processes and activities to enhance the efficiency and effectiveness of reporting and alerting.
Research, analyse and understand log sources utilized for the purpose of security monitoring, particularly security and networking devices (such as firewalls, routers, anti-virus products, proxies, EDR, operating systems, etc…), in order to increase effectiveness of the log correlation.
Provide technical inputs to management during proof-of-concept reviews for new security products to ensure alignment with the set policies and guidelines.
Provide technical guidance to the Security teams and/or the lines of business during investigations or incident response in order to help in the investigation and root cause analysis.
Requirements
• Bachelor's degree of Engineering, Computer Science or equivalent.
• Minimum 3 - 6 years of experience in SIEM Technology platforms years of experience for senior)
• Working knowledge of Information Security concepts and practices
• Very Good experience of the SIEM, SOAR, TIP, DAM and FIM solutions
• Knowledge of Data Activity Monitor and File Integrity Monitor solutions
• General network knowledge, TCP/IP Troubleshooting
• Familiarity with system log information and what it means
• Understanding of common network services (web, mail, DNS, DHCP, authentication)
• Strong shell scripting experience using Bash, and Python
• Knowledge of systems metrics and performance monitoring
• Experience with virtual environments and containers (Docker, LXC)
• Strong Linux and Windows knowledge
• Good understanding of Database concepts
• Recommended –one or more of- the below certifications:
o SIEM Vendor Related Certificates
o SOAR Vendor Related Certificates
o TIP vendor related certificates
o SANS Global Information Assurance Certification (GIAC)
o EC-Council – CEH
o CISM
o CISSP
• Very good command of English and Arabic language
• Good communication skills
Security Operations Specialist
Posted today
Job Viewed
Job Description
Company:
Estarta
Client:
Fortinet
Location:
Riyadh, Saudi Arabia (Relocation required if not currently residing in Saudi Arabia)
Job Summary:
Estarta is seeking a highly skilled and motivated
SOC Engineer
to join our cybersecurity team in partnership with
Fortinet
. The ideal candidate will have extensive hands-on experience with
SIEM, SOAR, and Endpoint Detection & Response (EDR) platforms
and a strong passion for enhancing threat detection, incident response, and security automation. In this role, you will play a critical part in
monitoring, detecting, investigating, and responding to security threats
across enterprise environments. This position is perfect for professionals who thrive in fast-paced SOC operations and are eager to contribute to improving an organization's overall security posture.
Key Responsibilities:
- Design, deploy, and manage enterprise
SIEM solutions
(e.g., FortiSIEM, Splunk, QRadar) to ensure comprehensive security monitoring and visibility. - Develop, optimize, and maintain
correlation rules, dashboards, alerts, and reports
to improve detection accuracy and reduce false positives. - Build, deploy, and manage
SOAR playbooks
to automate incident response tasks and integrate with EDR tools, ticketing systems, and threat intelligence platforms. - Monitor and respond to security alerts from
EDR solutions
(e.g., FortiEDR, CrowdStrike, SentinelOne), performing triage and incident investigation. - Conduct
threat hunting
and advanced investigations using indicators of compromise (IOCs), behavioral analytics, and threat intelligence. - Collaborate with SOC analysts, incident responders, and IT teams to
contain, mitigate, and remediate security incidents
efficiently. - Document and maintain
playbooks, procedures, detection logic, and post-incident reports
for operational consistency and knowledge sharing. - Contribute to continuous improvement of
detection coverage, response workflows, and overall cybersecurity strategy
. - Mentor junior SOC personnel and support team training initiatives.
Required Skills and Qualifications:
- Minimum
5 years of experience
in cybersecurity operations, SOC engineering, or related roles. - Strong expertise in
SIEM platforms
(FortiSIEM, Splunk, QRadar), including deployment, tuning, and reporting. - Hands-on experience with
SOAR tools
(FortiSOAR, Cortex XSOAR, Tines) and workflow automation. - Proficiency with
EDR platforms
(FortiEDR, CrowdStrike, Carbon Black, Microsoft Defender for Endpoint). - Solid understanding of
MITRE ATT&CK framework
, threat intelligence, and IOC correlation. - Experience writing
detection rules and queries
(regex, KQL, or custom query languages). - Working knowledge of
scripting/automation
using Python, PowerShell, or Bash. - Strong analytical, problem-solving, and troubleshooting skills with high attention to detail.
- Excellent
communication and collaboration skills
in cross-functional teams. - Relevant cybersecurity certifications (e.g.,
GCIH, GCIA, Splunk Certified, Fortinet NSE
) are a plus.
Preferred Qualifications:
- Experience in
cloud security monitoring
(AWS, Azure, or Google Cloud) and integrating cloud-native security tools into SIEM/SOAR workflows. - Knowledge of
regulatory compliance frameworks
(ISO 27001, NIST, GDPR, SOC 2). - Familiarity with
vulnerability management, threat modeling, and red team exercises
.
Relocation:
Candidates currently outside Saudi Arabia must be willing to
relocate to Riyadh
.
Security Operations Manager
Posted today
Job Viewed
Job Description
Company Description
Forces plus Security is an Egyptian company offering a wide range of security services, including manned guarding, remote monitoring, access control, and event security. With over 50 years of experience, the company focuses on providing comprehensive security solutions for public and private clients, emphasizing trust, honesty, and investing in technology to meet evolving security needs. Forces plus Security is part of the
AS-Salam Group
and employs over 3,000 people, all with high standards of training and professionalism.
Role Description
This is a full-time on-site role for a Security Operations Manager located in Qesm 1st Nasser City. The Security Operations Manager will be responsible for overseeing daily security operations, managing physical security measures, implementing cybersecurity strategies, managing vulnerability assessments, and ensuring network security. The role involves coordinating with different departments to ensure compliance with security policies and protocols, conducting risk assessments, and developing security training programs for the staff.
Qualifications
- Strong Operations Management skills
- Proficient in Physical Security and Cybersecurity
- Experience in Vulnerability Management and Network Security
- Excellent leadership and team management abilities
- Strong problem-solving and analytical skills
- Effective communication and interpersonal skills
- Ability to work independently and collaboratively
- Bachelor's degree in Information Security, Cybersecurity, or related field
- Relevant certifications such as CISSP, CISM, or equivalent are a plus