Cyber Security Analyst (SOC - Azure Sentinel)
Job Purpose

The Cyber Security Analyst is a part of the 24x7 Cyber Security Security Operations Centre (SOC), with an operational role to detect, prevent, and respond to cyber-attacks. The role will be a hands-on technical cyber security role with expertise in the area of cyber security operations center and incident response.

Roles And Responsibilities

  • Be part of 24/7 team for cyber security alert monitoring and incident response and be responsible to track and close all alert tickets raised on IT Service Management tool.
  • Must also be able to participate in rotating shifts and must be able to work collaboratively. Having the ability to work outside of normal working hours as required due to critical incidents or emergency calls, will be essential to success in this role
  • Assist the Cyber Security manager in the analysis of security breaches to identify the root cause.
  • Perform log event analysis by correlating data from various log sources for threat detection.
  • Monitor security logs from various sources, including firewalls, intrusion detection systems (IDS), and endpoint security products to identify anomalous behavior and potential threats.
  • Utilize advanced techniques, such as threat intelligence and behavioral analysis to enhance monitoring capabilities.
  • Conduct phishing email analysis to triage phishing emails reported to the SOC.
  • Configure and maintain security tools, such as SIEM, SOAR to enhance monitoring capabilities.
  • Work effectively following standard operating procedures, with other SOC team and Incident Response members and cross-functional teams to share knowledge and coordinate incident response activities.
  • Perform other department duties related to his / her position as directed by the Head of the Department

Be Part Of An Extraordinary Story

Your skills. Your imagination. Your ambition. Here, there are no boundaries to your potential and the impact you can make. You’ll find infinite opportunities to grow and work on the biggest, most rewarding challenges that will build your skills and experience. You have the chance to be a part of our future, and build the life you want while being part of an international community.

Our best is here and still to come. To us, impossible is only a challenge. Join us as we dare to achieve what’s never been done before. Together, everything is possible.

Job Posting

May 7, 2025, 3:54:55 PM

About You

  • Bachelor Degree holder with m inimum 3 years of relevant experience with minimum 1+ yrs of experience in Azure Sentinel and MS Defender.
  • Proficient with Azure Sentinel and MS Defender; focusing primarily on SIEM (security information and event manager) for monitoring, XDR (Extended Detection and Response) for incident response actions.
  • Possess knowledge of a Security Operations Center (SOC) operations
  • Possess knowledge on log management, logs generated by various applications or appliances of IT infrastructure for SIEM event correlation.
  • Ability to define various SIEM use cases based on IT environment for better detection of anomalies
  • Experience being part of Cyber Security Team which monitors a large geographically dispersed technology environment
  • Network Fundamentals: Understanding of network protocols (TCP/IP, UDP, HTTP, HTTPS), network devices (routers, switches), and network security concepts (firewalls, intrusion detection systems).
  • Operating Systems: Proficiency in Windows and Linux operating systems, including command-line interface (CLI) usage and basic system administration.
  • Security Tools: Familiarity with security tools such as SIEM, SOAR, IDS/IPS, firewalls, endpoint security solutions, and vulnerability scanners.
  • Scripting and Programming: Basic scripting skills (Python, PowerShell, Bash) to automate tasks and analyze data would add value.
  • Log Analysis: Ability to corelate and analyze logs from various sources (firewalls, servers, applications, security solutions) to identify anomalies and security threats.
  • Knowledge of Microsoft Defender for Endpoint, Cloud, Identity.

Preferred

  • Threat Intelligence: Understanding of threat intelligence concepts and ability to leverage threat feeds to improve security posture.
  • Understanding of Security platforms and tools such as Network and Endpoint security tools IPS, IDS, Malware protection, Application Whitelisting.
  • Understanding of Purple teaming concepts.
  • Preferable if the candidate possess any of the MS Certifications AZ-900 and SC-200 / AZ-500

About Qatar Airways Group

Our story started with four aircraft. Today, we deliver excellence across 12 different businesses coming together as one. We’ve grown fast, broken records and set trends that others follow. We don’t slow down by the fear of failure. Instead, we dare to achieve what’s never been done before.

So, whether you’re creating a unique experience for our customers or innovating behind the scenes, every person contributes to our proud story. A story of spectacular growth and determination. Now is the time to bring your best ideas and passion to a place where your ambition will know no boundaries, and be part of a truly global community.

How To Apply

If you’re ready to join a progressive team and have a challenging and rewarding career, then apply now by uploading your CV and completing our quick application form.
Post Date
2025-05-07
Job Type
-
Employment type
Full-time
Category
Information Technology
Level
Entry
Country
Qatar
Industry
AirlinesAviation ,
Qatar Airways*******