Analyze security events, handle incidents, provide root cause analysis, and improve incident handling processes with strong incident response and digital forensics skills.
Job Location: United Arab Emirates
Experience: 3 to 10 years
Qualification Level: Graduate; Engineering Graduates/PG
Job Function: IT - Software
Skillset: SOC detection framework, etc.
Seeking motivated L2 SOC Analysts for continuous security monitoring, incident response, threat hunting, and automation improvements with relevant certifications and technical skills.
Lead Security Operations Center operations, manage incident response, enhance processes, and mentor analysts while utilizing cybersecurity tools and frameworks.
The role involves managing information security with expertise in Endpoint Detection and Response, Data Loss Prevention, and Security Operations Center in the banking domain.
The role involves managing IT security operations using Proofpoint, Forcepoint Proxy, and Juniper SRX, with Azure Cloud experience preferred.
Provide specialist support in information security, including incident response, vulnerability management, and security awareness training, while ensuring compliance with policies.
Monitor and control building management systems, manage work requests, and ensure operational efficiency while demonstrating strong communication and teamwork skills.
Design and implement enterprise network and security solutions, focusing on cloud security, compliance, and data protection using various technologies and frameworks.
Conduct risk assessments, implement security controls, monitor security events, and support security awareness programs with a focus on compliance and vulnerability management.
Responsibilities include monitoring security incidents, providing support, managing vulnerabilities, and requiring a degree in computer science with a Cyber Security focus.
Monitors systems for suspicious activity, investigates incidents, and implements defenses to mitigate security threats in cybersecurity.
Monitor cybersecurity threats, conduct initial analysis, validate incidents, and coordinate responses while ensuring compliance with policies and procedures.
Responsible for conducting security audits, monitoring breaches, developing policies, and providing training; requires a degree in computer science and relevant certifications.
The role involves assessing cloud security, implementing policies, monitoring incidents, and requires knowledge of cloud platforms and relevant certifications.