Cybersecurity Defense Specialist
About This Role
Job Purpose
The Cyber Defense Specialist is responsible for monitoring, detecting, analyzing, and responding to cybersecurity threats across the organization. The role focuses on security operations, incident response, vulnerability management, and strengthening the organization’s defensive posture and architecture in alignment with cybersecurity best practices and regulatory requirements but not limited
Hiring Manager - Maaz Khan
Key Responsibilities Included but not limited to
1. Security Monitoring & Incident Detection
- Monitor security alerts and events from SIEM, EDR, and other detection tools.
- Perform initial investigation and triage of suspicious behavior.
- Identify indicators of compromise (IOCs) and escalate critical alerts.
- Support enhancements to detection rules and monitoring use cases.
- Follow the cybersecurity PPP’s of MyFatoorah
- Develop Use Cases
- Onboard Assets
- Ensure To Close the Tickets alerts in collaboration with IT
- Collaboration with IT and improve MTTR & MTTD
- Oversee the MSSP / SOCAAS
2. Incident Response
- Assist in containment, analysis, and documentation of security incidents.
- Collect and preserve digital evidence as needed.
- Prepare incident reports and support post-incident reviews.
- Participate in improving response playbooks and procedures.
- Follow the cybersecurity processes and procedures of MyFatoorah
- Develop tabletop exercises
3. Endpoint, Network & Cloud Defense
- Assist in managing endpoint protection and threat prevention tools.
- Support firewall review activities and basic access control checks.
- Provide input on hardening endpoints and improving network defense.
- Support security controls across on-prem and cloud infrastructures.
- Implement MBSS & Manage Brand Protection
4. Data Protection & Access Management
- Assist with data leakage prevention (DLP) monitoring and policy tuning.
- Support identity and access management reviews under supervision.
- Help ensure proper access provisioning based on least privilege.
5. Vulnerability Management & Penetration Testing
- Perform periodic vulnerability scans and verify findings.
- Track remediation efforts with system owners.
- Provide basic risk assessment and recommend mitigations.
6. Security Awareness & Phishing Defense
- Support phishing simulations and awareness campaigns.
- Analyze results and coordinate follow-up actions.
- Develop Phishing campaigns
7. Documentation & Compliance Support
- Maintain security operations documentation, incident logs, and reports.
- Contribute to cybersecurity governance tasks such as policy updates.
- Assist in providing evidence for audits or compliance assessments.
- Own cyber technical audits
Qualifications
Education
- Bachelor’s degree in Cybersecurity, Information Security, Computer Science, or a related field.
Experience
- 1–3 years’ experience in cybersecurity roles such as:
- SOC Analyst
- Cyber Defense Analyst
- Incident Response Analyst
- Security Operations Engineer
- Network security Engineer
Technical Skills
- Hands-on experience with SIEM and EDR tools.
- Ability to analyze logs from security tools, servers, and network devices.
- Understanding of common cyberattack techniques and detection methods.
- Basic firewall and network security knowledge.
- Familiarity with vulnerability scanning tools (e.g., Qualys, Nessus).
- Some scripting ability (Python, PowerShell) is an advantage.
- Exposure to data loss prevention (DLP) solutions preferred.
- Knowledge of security frameworks (ISO 27001, NIST, or local regulations like SAMA).
- DFIR Skills Is Must
- Use Cases Skills are must
- Collab with IT to get the tasks done
- Network security
- Defense in depth and privacy by design
- You should be able to bear more responsibilities in your growing career.
Soft Skills
- Strong analytical and problem-solving skills.
- Ability to work in fast-paced environments and handle multiple alerts and tasks.
- Good communication and documentation skills.
- High motivation to learn and grow in advanced cyber defense areas.
- Ability to work under pressure to achieve targets
- You should be able to bear more responsibilities in your growing career.
What We Offer
- Opportunity to work with modern cybersecurity technologies and shape your future
- Opportunity to transition from Analyst to specialist with experienced cybersecurity employees
Stop applying blindly.
Start getting hired.
Base Career automates the hardest parts of job searching — apply smarter, not harder.
AI Resume in 60s
Your resume rewritten for this exact role using the job description as the brief.
ATS-Optimized
Get past automated screening filters with the right keywords matched to each job.
Application Tracker
Track every job, follow-up, and interview in one visual kanban board.
Free plan · No credit card required