Enable job alerts via email!
A leading cybersecurity firm in Dubai is seeking a skilled SOC Analyst. You will monitor security incidents, analyze alerts, and collaborate with security teams to mitigate threats. The ideal candidate has at least 5 years' experience in a Security Operations Center and is proficient with SIEM tools like Splunk and Azure Sentinel. Relevant certifications are preferred, and the role demands excellent analytical skills under pressure.
Job Summary
We are looking for a skilled SOC Analyst with a strong background in OT Security and at least 5 years of experience in a Security Operations Center.
The ideal candidate will possess hands-on expertise in incident response, security event triage, and be proficient in SIEM platforms such as Splunk, QRadar, or Azure Sentinel.
Key responsibilities include real-time monitoring and investigating security incidents, analyzing alerts to identify threats, and collaborating with OT security teams.
Candidates should have excellent analytical skills, the ability to work under pressure, and ideally hold relevant certifications.
Responsibilities
Perform real-time monitoring, detection, and triaging of security events from SIEM and other security tools.
Investigate and respond to security incidents in accordance with incident response playbooks.
Analyse alerts, logs, and telemetry data to identify malicious activity and potential threats.
Provide initial containment and escalation to L2 / L3 teams as needed.
Collaborate with OT security teams to identify, analyse, and mitigate threats within industrial environments.
Document incident investigations and contribute to improving SOC operational procedures.
Ensure alignment with security best practices and compliance requirements.
GCIA
GCIH
Splunk Certified
Qualifications
Senior SOC Analyst with 5+ years"
Bachelor's Degree in Computer Science, Information Technology, or a related field"