Enable job alerts via email!

Analyst - SOC Monitoring

CPX

Dubai

On-site

AED 50,000 - 75,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

A cybersecurity firm located in Dubai is seeking a SOC Analyst to monitor and analyze security incidents and ensure the health of the SIEM tool. The ideal candidate will have at least 4 years of experience, a Bachelor's degree in a related field, and certifications like CompTIA Security+ and CEH. Strong analytical and communication skills are crucial, along with the ability to work independently and in a team-oriented environment.

Qualifications

  • Minimum of 4+ years’ relevant experience in ICT focusing on Cyber Security.
  • CompTIA Security+ certification is required.
  • EC-Council Certified Ethical Hacker (CEH) is preferred.

Responsibilities

  • Examine network topologies to understand data flow.
  • Monitor and analyze system activity for malicious activity.
  • Detect incidents through SIEM console monitoring.
  • Report and document incidents according to management processes.
  • Assist in incident investigation and resolution.

Skills

High-level understanding of TCP/IP protocol
Knowledge of security best practices
Intermediate knowledge of LAN/WAN technologies
Analytical skills
Verbal communication skills
Ability to multi-task
Team player

Education

Bachelor’s degree in engineering, computer science, or related field

Tools

SIEM tools
IPS
Antivirus software
File Integrity Monitoring tools
DLP solutions

Job description

Examine network topologies to understand data flow through the network.

Use SOC tools to monitor and analyze system activity to identify malicious activity continually.

Identify network mapping and operating system fingerprinting activities.

Continuously monitor the SIEM events / alerts to identify any anomalies.

Perform event correlation using information from various sources within the organization to gain situational awareness and determine the effectiveness of observed attacks.

Detect Incidents by monitoring the SIEM console, Rules, Reports, and Dashboards.

Provide timely detection, identification, and alerts of possible attacks / intrusions, anomalous activities, and misuse activities, distinguishing these incidents and events from benign ones.

Report the confirmed incident as per the Incident management process.

Notify the Senior SOC Analyst on suspected / anomaly events for further analysis.

Document and escalate incidents (including the event’s history, status, and potential impact for further action) that may cause an ongoing and immediate impact on the environment.

Monitor the health of the SIEM tool and report any issues / incidents / malfunctions to the SOC SIEM administrator.

Assist Senior SOC Analysts and security specialists in incident investigation and workflow.

Assist the Senior SOC Analyst and internal team in incident detection and resolution.

Communicate and provide necessary information to external teams for timely incident resolution.

Skills and knowledge

High-level understanding of TCP / IP protocol and OSI Seven Layer Model.

Knowledge of security best practices and concepts.

Knowledge of Windows and / or Unix-based systems / architectures and related security.

Intermediate level of knowledge of LAN / WAN technologies.

Must have a solid understanding of information technology and information security.

Good understanding of defense-in-depth analysis techniques.

Knowledge of log monitoring, analysis, and correlations.

Knowledge of Incident detection, reporting, and responding.

Understanding of security threats and vulnerabilities.

Ability to use SIEM console to create / analyze Rules, Reports, and Dashboards.

Sound knowledge of the functioning of IPS.

Intermediate knowledge of using common security products like SIEM, IPS, Antivirus, File Integrity Monitoring, and DLP.

Characteristics :

Highly result oriented and able to work independently.

Good analytical, technical, written, and verbal communication skills.

Ability to multi-task in a fast-paced and demanding work environment.

Strong team player.

Comfortable with a high-tech work environment and constantly learning new tools and innovations.

Flexibility to work all shifts and willingness to assist the team with overtime.

Self-motivated, curious, and knowledgeable about information security news and current events.

AOR (Any Other Responsibilities)

Any other responsibilities as required by the Line Manager

Job Specifications

Certifications (Technical & Non-Technical)

CompTIA Security+

EC-Council Certified Ethical Hacker (CEH)

Minimum of 4+ years’ relevant experience or working in a large-scale ICT environment focusing on Information / Cyber Security.

Education

Bachelor’s degree in engineering, computer science, information systems, or any other quantitative field.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.