Enable job alerts via email!

SOC Analyst - OT Security

cander

Dubai

On-site

AED 120,000 - 150,000

Full time

29 days ago

Job summary

A leading cybersecurity firm in Dubai is seeking a skilled SOC Analyst. You will monitor security incidents, analyze alerts, and collaborate with security teams to mitigate threats. The ideal candidate has at least 5 years' experience in a Security Operations Center and is proficient with SIEM tools like Splunk and Azure Sentinel. Relevant certifications are preferred, and the role demands excellent analytical skills under pressure.

Qualifications

  • 5+ years of experience in a Security Operations Center.
  • Hands-on expertise in incident response and security event triage.
  • Relevant certifications such as GCIA and GCIH.

Responsibilities

  • Perform real-time monitoring and detection of security events.
  • Investigate and respond to security incidents as per playbooks.
  • Analyse alerts and logs to identify malicious activity.
  • Collaborate with OT security teams for threat mitigation.
  • Document investigations and enhance SOC procedures.

Skills

Incident response
Security event triage
SIEM platforms (Splunk, QRadar, Azure Sentinel)
Analytical skills
Ability to work under pressure

Education

Bachelor's Degree in Computer Science, Information Technology, or a related field

Tools

Splunk
QRadar
Azure Sentinel
Job description

Job Summary

We are looking for a skilled SOC Analyst with a strong background in OT Security and at least 5 years of experience in a Security Operations Center.

The ideal candidate will possess hands-on expertise in incident response, security event triage, and be proficient in SIEM platforms such as Splunk, QRadar, or Azure Sentinel.

Key responsibilities include real-time monitoring and investigating security incidents, analyzing alerts to identify threats, and collaborating with OT security teams.

Candidates should have excellent analytical skills, the ability to work under pressure, and ideally hold relevant certifications.

Responsibilities

Perform real-time monitoring, detection, and triaging of security events from SIEM and other security tools.

Investigate and respond to security incidents in accordance with incident response playbooks.

Analyse alerts, logs, and telemetry data to identify malicious activity and potential threats.

Provide initial containment and escalation to L2 / L3 teams as needed.

Collaborate with OT security teams to identify, analyse, and mitigate threats within industrial environments.

Document incident investigations and contribute to improving SOC operational procedures.

Ensure alignment with security best practices and compliance requirements.

GCIA

GCIH

Splunk Certified

Qualifications

Senior SOC Analyst with 5+ years"

Bachelor's Degree in Computer Science, Information Technology, or a related field"

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.