Monitoring of security events received through SIEM Health Check the status of the configured log sources. Check if there is any system notification errors to resolve Identify security breaches and other cyber security incidents. Provide recommendation for developing new use cases and tuning for implemented ones Performing Level 1 triage of incoming incidents and determine its severity. Monitoring of alerts’ dependencies Perform initial investigation for the received alerts Provide limited incident response to end users for low complexity security incidents Collect, document and preserve incident evidence Escalating issues to Tier 2 when necessary after close monitoring and investigation of incident Qualifications and Experience: Bachelor’s degree in IT or computer Science, or related field. Strong knowledge of SIEM Systems (IBM QRadar preferred), user and network anomaly analytics, SOAR integration and Threat Intelligence platform. Have professional certifications in incident handling & response such as GCIH, Ecir. 3-5 years of relevant experience Experience within Banking Industry will be considered as an asset 24/7 work shift is required. Skills: Excellent command of English and Arabic languages (written and spoken) Excellent decision making skills Excellent communication skills Excellent planning and organizing skills Excellent Business Acumen of external market and up-to date market trends and practices. In-depth skills to respond to cyber-attacks and ability to defend the security network of the bank.