Cybersecurity Analyst
Role Overview
The Cybersecurity Analyst safeguards clients’ digital assets by continuously monitoring networks and systems, identifying vulnerabilities, and responding to incidents. This role is central to ensuring organizations remain resilient against evolving cyber threats, particularly in sectors such as banking, telecom, and government, where compliance with local and international security regulations is paramount.
Key Responsibilities
The analyst monitors traffic and system activity for anomalies using tools such as SIEM, IDS, and IPS. They investigate breaches, execute incident response plans, and manage recovery efforts to minimize impact. Regular vulnerability assessments and penetration tests are conducted to identify weaknesses, while security measures such as firewalls, endpoint protection, and data loss prevention tools are maintained and configured. The analyst ensures compliance with standards like ISO 27001 and PCI-DSS, prepares security intelligence and incident reports, and delivers training to foster a culture of security awareness. Continuous improvement is expected, with the analyst staying up to date on evolving threats and proposing enhancements to processes and tools.
Qualifications and Skills
A Bachelor’s degree in Cybersecurity, Computer Science, or related discipline is required, along with at least three years of experience in security operations. Industry certifications such as CISSP, CEH, or Security+ are highly valued. Technical expertise includes knowledge of operating systems, scripting for automation, SIEM platforms, and vulnerability scanners. Analytical thinking, attention to detail, and clear communication skills are essential, particularly when explaining complex security issues to non-technical stakeholders. Preferred candidates will have advanced certifications, sector-specific experience, and bilingual proficiency.
Reporting and Projects
The analyst reports to a Cybersecurity Manager or the CISO and typically operates within a Security Operations Center, working closely with IT and development teams. Projects may involve monitoring financial networks, protecting telecom infrastructures from intrusion, securing e-government platforms, or responding to ransomware incidents. The role is based in Cairo with some regional travel, and requires availability for on-call rotations and flexibility to respond during crises.
