{"id":860385,"date":"2025-05-26T06:24:44","date_gmt":"2025-05-26T05:24:44","guid":{"rendered":"https:\/\/welovesalt.com\/mena\/jobs\/%wpbb_job_industry%\/it-security-operations-analyst"},"modified":"2025-07-10T12:28:12","modified_gmt":"2025-07-10T11:28:12","slug":"it-security-operations-analyst-860385","status":"archive","type":"wpbb_job","link":"https:\/\/welovesalt.com\/mena\/jobs\/technology\/cyber-security\/it-security-operations-analyst-860385","title":{"rendered":"IT Security Operations Analyst"},"content":{"rendered":"
We are seeking an experienced IT Security Operations Analyst<\/strong> to support and enhance our organization’s cybersecurity posture. The successful candidate will play a vital role in threat detection, incident response, vulnerability management, and ensuring compliance across our infrastructure. This is a hands-on position that requires strong technical skills, analytical thinking, and a proactive approach to security operations.<\/p>\n<\/p>\n Key Responsibilities:<\/strong><\/p>\n Technical Skills:<\/strong><\/p>\n Soft Skills:<\/strong><\/p>\n Qualifications:<\/strong><\/p>\n Salt is acting as an Employment Agency in relation to this vacancy.<\/p>\n","protected":false},"excerpt":{"rendered":" We are seeking an experienced IT Security Operations Analyst to support and enhance our organization’s cybersecurity posture. The successful candidate will play a vital role in threat detection, incident response, vulnerability management, and ensuring compliance across our infrastructure. This is a hands-on position that requires strong technical skills, analytical thinking, and a proactive approach to…<\/p>\n","protected":false},"template":"","wpbb_job_industry":[71],"wpbb_job_location":[714],"wpbb_job_type":[9],"wpbb_job_skill":[],"wpbb_job_locationType":[],"class_list":["post-860385","wpbb_job","type-wpbb_job","status-archive","hentry","wpbb_job_industry-cyber-security","wpbb_job_location-uae-dubai","wpbb_job_type-permanent"],"acf":[],"_links":{"self":[{"href":"https:\/\/welovesalt.com\/mena\/wp-json\/wp\/v2\/wpbb_job\/860385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/welovesalt.com\/mena\/wp-json\/wp\/v2\/wpbb_job"}],"about":[{"href":"https:\/\/welovesalt.com\/mena\/wp-json\/wp\/v2\/types\/wpbb_job"}],"wp:attachment":[{"href":"https:\/\/welovesalt.com\/mena\/wp-json\/wp\/v2\/media?parent=860385"}],"wp:term":[{"taxonomy":"wpbb_job_industry","embeddable":true,"href":"https:\/\/welovesalt.com\/mena\/wp-json\/wp\/v2\/wpbb_job_industry?post=860385"},{"taxonomy":"wpbb_job_location","embeddable":true,"href":"https:\/\/welovesalt.com\/mena\/wp-json\/wp\/v2\/wpbb_job_location?post=860385"},{"taxonomy":"wpbb_job_type","embeddable":true,"href":"https:\/\/welovesalt.com\/mena\/wp-json\/wp\/v2\/wpbb_job_type?post=860385"},{"taxonomy":"wpbb_job_skill","embeddable":true,"href":"https:\/\/welovesalt.com\/mena\/wp-json\/wp\/v2\/wpbb_job_skill?post=860385"},{"taxonomy":"wpbb_job_locationType","embeddable":true,"href":"https:\/\/welovesalt.com\/mena\/wp-json\/wp\/v2\/wpbb_job_locationType?post=860385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n
Continuously monitor cybersecurity tools (including SIEM platforms) to detect and investigate threats. Conduct in-depth analysis of alerts and log data to identify malicious activity, determine impact, and initiate appropriate containment and remediation actions.<\/li>\n
Generate detailed incident reports, maintain records of security events, and deliver regular updates on trends and response metrics. Provide recommendations to improve overall threat posture based on incident analysis.<\/li>\n
Track current cybersecurity threats, vulnerabilities, and evolving tactics. Evaluate the relevance of external threat intelligence and its potential impact on the organization’s systems and cloud infrastructure.<\/li>\n
Perform vulnerability scans and penetration tests. Collaborate with infrastructure and application teams to address and remediate findings, ensuring timely patching and mitigation.<\/li>\n
Develop and refine documentation including incident response procedures, operational workflows, and security playbooks to standardize and improve incident handling and readiness.<\/li>\n
Administer a range of security tools (e.g., endpoint protection, IAM systems, SIEM, XDR). Maintain integration health, optimize configurations, and enhance detection capabilities through custom queries and rules.<\/li>\n
Support policy development and configuration compliance checks. Ensure adherence to internal standards and industry frameworks (e.g., ISO, NIST).<\/li>\n<\/ul>\n\n
\n
\n