×
Register Here to Apply for Jobs or Post Jobs. X

SOC Team Leader

Job in Riyadh, Riyadh Region, Saudi Arabia
Listing for: NICE ONE | نايس ون
Full Time position
Listed on 2026-01-24
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager, IT Support
Salary/Wage Range or Industry Benchmark: 150000 - 200000 SAR Yearly SAR 150000.00 200000.00 YEAR
Job Description & How to Apply Below

Join Nice one as a SOC Team Leader. In this security-focused role you will lead the Security Operations Center (SOC) team to detect, investigate, and respond to cybersecurity incidents while improving monitoring, processes, and tool effectiveness. The role emphasizes operational leadership, incident management, threat hunting and intelligence, cross-functional coordination with IT and risk teams, and continuous improvement to reduce risk, improve detection, and ensure timely, compliant incident handling.

Key Responsibilities
  • Lead, mentor, and develop a team of SOC analysts across shifts, ensuring coverage, capability growth, and consistent application of playbooks and detection procedures.
  • Oversee day-to-day SOC operations including monitoring alerts, triage, investigation, escalation, and incident response in accordance with defined SLAs and incident classification.
  • Manage and coordinate response to security incidents, including containment, eradication, recovery activities, root cause analysis, and post-incident reporting and remediation tracking.
  • Maintain and improve SOC detection capabilities by tuning SIEM rules, integrating telemetry sources, validating alerts, and optimizing use of EDR, network detection, cloud security, and threat intelligence tools.
  • Drive proactive threat hunting and use threat intelligence to identify emerging risks, attacker behaviors, and gaps in coverage; translate findings into detection and prevention improvements.
  • Develop, update, and enforce SOC processes, runbooks, escalation paths, and playbooks to ensure repeatable, auditable incident handling and continuous improvement.
  • Coordinate with IT, engineering, risk, compliance, and business teams to communicate incidents, support investigations, and implement mitigation and remediation actions.
  • Produce timely and actionable operational and executive reports on SOC performance, metrics (MTTR, MTTD, alert volumes, false positive rates), and incident trends to stakeholders.
  • Manage vendor relationships and integrations for managed detection and response (MDR), threat intelligence, and security tooling; evaluate and onboard solutions to improve SOC effectiveness.
  • Ensure SOC operations comply with applicable policies, regulatory requirements, and internal security standards; participate in audits and readiness activities when required.
Required Qualifications
  • Bachelor’s degree in Computer Science, Information Security, or related field, or equivalent practical experience.
  • 5+ years of experience in security operations, incident response, or a related cybersecurity role, with at least 2 years in a supervisory or team lead capacity.
  • Hands-on experience with SIEM (e.g., Splunk, Elastic, QRadar), EDR platforms, network detection tools, and common security telemetry sources.
  • Strong incident response, digital forensics, and threat-hunting skills with familiarity across on-premises, cloud (AWS/Azure/GCP), and hybrid environments.
  • Professional certifications such as GCIA, GCIH, CISSP, CISM, or equivalent are preferred.
  • Professional proficiency in English is required; proficiency in Arabic is a plus depending on location.
  • Legal right to work in the hiring country and availability to support rotating shifts, on-call duties, and incident response outside business hours as needed.
Required Skills
  • Strong leadership and people-management skills with the ability to coach analysts, manage performance, and foster a collaborative, learning-focused team culture.
  • Excellent analytical and problem-solving skills with the ability to prioritize under pressure and make timely, evidence-based decisions during incidents.
  • Solid technical knowledge of common attack techniques, log sources, networking, operating systems, and cloud services to guide investigations and tune detections.
  • Effective communication skills to translate technical findings into clear recommendations for technical and non-technical stakeholders, and to prepare executive summaries.
  • Process-oriented mindset with attention to detail for maintaining runbooks, documentation, and SOC metrics; experience improving operational workflows and automation.
  • Ability to work collaboratively across a matrixed organization and adapt to changing priorities in a fast-paced security environment.

Nice one is committed to creating an inclusive workplace. We welcome applications from all qualified candidates and will provide reasonable accommodations during the recruitment process upon request.

#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary