SOC & SIEM Cybersecurity Trainer
Location:
The Gulf and the Caucasus area (Relocation Required)
Salary:
Competitive package, salary above market rates, accommodation and travel covered
Contract Type:
The Gulf and the Caucasus area (Relocation Required)
Position Overview
We are looking for an experienced Cybersecurity Trainer to deliver a comprehensive Security Operations Center (SOC) training program. This course equips learners with the practical knowledge and skills needed for real-world blue team roles, focusing on threat detection, incident response, log analysis, and SIEM tools. The ideal candidate has hands-on SOC experience and the ability to mentor aspiring Level 1/2 SOC Analysts.
Package:
1) Competitive base salary (DOE)
2) Full coverage of travel expenses
3) Fully furnished accommodation with an office (relocation is required for this role)
4) No income tax (due to the nature of the location)
5) Full medical cover
In this position, you will:
Join a team of instructors, responsible for our cybersecurity programs.
Conduct frontal teaching of information security and cyber courses.
Use Innovative technologies.
Develop and teach advanced labs.
Development of pedagogic materials and labs.
Company Overview
Our client delivers tailored cyber training and specialised products supported by modern technology and deep operational experience. Their programmes include realistic simulation environments, practical lab-based learning, and fully customised training paths that reflect the latest industry needs and emerging threats.
Their work supports government, defence, and commercial organisations, enabling teams to develop real-world capability in secure, controlled and immersive settings. They continue to invest heavily in research and development to ensure their solutions remain relevant, effective, and future-focused.
Key Responsibilities
Deliver the full SOC-focused curriculum, including:
SIEM fundamentals and log collection
Threat detection and MITRE ATT&CK mapping
Incident handling and triage workflows
Phishing investigations and malware event analysis
Log analysis using Sysinternals, Event Viewer, and related tools
Develop hands-on labs using real or simulated SOC environments.
Teach alert prioritization, playbooks, escalation procedures, and reporting.
Mentor students on operating within 24/7 SOC environments.
Prepare learners for entry-level SOC certifications and job readiness.
Course Topics
Introduction to SOC and Blue Team roles
SIEM platforms (e.g., Splunk, Sentinel, QRadar, or equivalent)
MITRE ATT&CK and threat mapping
Incident response processes and triage techniques
Sysinternals toolkit and Windows event analysis
Phishing investigation and payload identification
Log analysis, playbook management, and reporting
Required Technical Expertise
Minimum of 2 years’ experience teaching or working in SOC, Blue Team, or Incident Response environments
Strong practical knowledge of SIEM platforms and threat detection workflows
Familiarity with the Cyber Kill Chain, MITRE ATT&CK, and incident response frameworks
Soft Skills
Strong communicator with the ability to explain complex SOC concepts clearly
Supportive and methodical teaching approach

