Enable job alerts via email!

Cyber Security Detection Engineer

Edge Group

Abu Dhabi

On-site

AED 60,000 - 100,000

Full time

2 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is on the lookout for a dedicated Cyber Security Detection Engineer to enhance its security posture. This exciting role involves designing and implementing security detection mechanisms, simulating threat actor tactics, and collaborating with intelligence teams to stay ahead of emerging threats. The ideal candidate will possess strong skills in Splunk and KQL, along with a solid understanding of threat actor behaviors. Join a dynamic team where your expertise will contribute to safeguarding the organization against evolving cyber threats. If you're passionate about cybersecurity and eager to make a difference, this opportunity is for you.

Qualifications

  • 5+ years of experience in security detection engineering.
  • Proficiency in Splunk and KQL for security detection.

Responsibilities

  • Design and maintain security detection mechanisms using Splunk.
  • Simulate threat actor techniques in a lab environment.

Skills

Splunk
KQL Query Writing
Threat Actor TTPs
Analytical Skills
Problem-Solving
Communication
Teamwork

Education

Relevant Certifications (OSCP, CPTS, PNPT, ePPT, ePTX)

Tools

Microsoft Sentinel

Job description

Select how often (in days) to receive an alert: Create Alert

Job Title: Cyber Security Detection Engineer

We are seeking a skilled Cyber Security Detection Engineer to join our team. The ideal candidate will have a strong background in security detection engineering, with proficiency in Splunk and KQL query writing. This role requires a hands-on approach to simulating threat actor tactics, techniques, and procedures (TTPs) in a lab environment based on best practices and the latest threat intelligence research.

Key Accountabilities
  1. Design, implement, and maintain security detection mechanisms using Splunk and KQL.
  2. Simulate threat actor TTPs in a lab environment to validate detection capabilities.
  3. Collaborate with threat intelligence teams to stay updated on emerging threats and best practices.
  4. Develop and execute detection use cases to identify potential security incidents.
  5. Analyze security events and alerts to determine severity and potential impact.
  6. Provide recommendations for improving detection and response strategies.
  7. Assist in the administration of SIEM platforms, particularly Splunk and Microsoft Sentinel.
Requirements
  • At least 5 years of relevant experience.
  • Experience in a SOC environment (preferably).
  • Proficiency in Splunk and KQL query writing.
  • Strong understanding of threat actor TTPs and experience in simulating them in a controlled environment.
  • Offensive security knowledge is a plus, with relevant certifications such as OSCP, CPTS, PNPT, ePPT, or ePTX.
  • Experience with SIEM administration, particularly with Splunk and Sentinel.
  • Excellent analytical and problem-solving skills.
  • Strong communication and teamwork abilities.

If you are passionate about cybersecurity and have the skills to protect our organization from emerging threats, we encourage you to apply.

J-18808-Ljbffr

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.