Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Location: Qatar
Job Type: Full-time
Experience Level: 1–3 years
Shift: 24x7 Rotational (including weekends and holidays)
Job Summary
We are looking for a proactive and detail-oriented L1 SOC Analyst with hands-on experience in LogRhythm SIEM. The ideal candidate will support the Security Operations Center (SOC) team in detecting, triaging, and responding to security incidents. This is a critical role requiring a strong foundation in cybersecurity operations, threat monitoring, and event analysis using LogRhythm SIEM.
Key Responsibilities
- Monitor and analyze security events and alerts from LogRhythm SIEM.
- Perform initial triage and classification of security incidents.
- Escalate incidents to L2/L3 analysts with sufficient context and evidence.
- Document incident details, timelines, and resolution steps in the incident tracking system.
- Execute runbooks for common alerts and known threat patterns.
- Perform daily health checks of LogRhythm SIEM and report anomalies.
- Maintain awareness of the latest cyber threats and attack vectors.
- Generate and share daily/weekly SOC reports.
- Collaborate with other SOC members to ensure proper threat detection and response.
- Adhere to internal SLA and escalation matrix.
- 1 to 3 years of experience in a SOC environment.
- Hands-on experience with LogRhythm SIEM including investigation, filtering, and basic rule analysis.
- Understanding of cybersecurity principles, threat actors, and common attack techniques.
- Familiarity with network protocols, Windows/Linux OS logs, and endpoint security tools.
- Knowledge of MITRE ATT&CK framework.
- Basic scripting knowledge (e.g., Python, PowerShell) is a plus.
- Strong documentation and reporting skills.
- Excellent analytical, troubleshooting, and communication skills.
- LogRhythm Certified Deployment Fundamentals or similar.
- CompTIA Security+, CySA+, CEH or any relevant security certification.
Bachelor’s degree in Computer Science, Information Security, or a related field.
Why Join Us
- Opportunity to work with cutting-edge SIEM and security tools.
- Learn and grow in a high-performance SOC team.
- Exposure to large-scale security operations and industry best practices.
- Competitive salary and career progression.
To apply, please submit your updated CV and indicate your experience level with LogRhythm SIEM.
Note: Only candidates who are willing to work on rotational shifts and have relevant SIEM experience will be considered.
Skills: siem,security operations,operations,troubleshooting,powershell,network protocols,security,logrhythm siem,communication skills,skills,cybersecurity principles,event analysis,windows/linux os logs,reporting,endpoint security tools,basic,soc,logrhythm,mitre att&ck framework,threat monitoring,python,documentation,analytical skills