Enable job alerts via email!

Technical Specialist - Cyber Security (L3)

Intertec Softwares

Dubai

On-site

AED 120,000 - 200,000

Full time

Today
Be an early applicant

Job summary

A prominent IT security organization in Dubai seeks a Technical Specialist - Cyber Security to protect its IT infrastructure. The role involves monitoring security incidents, managing security tools, and ensuring compliance. Ideal candidates should have 8-10 years of experience in cybersecurity operations and a strong knowledge of network security technologies. This position offers competitive compensation and opportunities for professional growth.

Qualifications

  • Minimum 8-10 years of hands-on experience in cybersecurity operations.
  • Strong understanding of network security technologies.
  • Experience in compliance with ISO 27001 and other standards.

Responsibilities

  • Monitor and respond to security incidents using SIEM and other tools.
  • Conduct daily health checks on security appliances and systems.
  • Participate in vulnerability assessments and ensure patch compliance.

Skills

Network security technologies
SIEM tools for monitoring
Incident response handling
Endpoint security management
Identity and Access Management (IAM)

Tools

SIEM platforms
Palo Alto
Fortigate
Cisco ASA/FTD
CrowdStrike
Job description
Job Purpose

To protect the organization’s IT infrastructure by actively monitoring, analysing, and responding to security incidents and threats. The Technical Specialist - Cyber Security plays a key role in implementing cybersecurity controls, managing security tools, and ensuring compliance with industry standards and regulatory frameworks.

Certifications

CISSP, CISM, CISA, CompTIA Security, or equivalent
Cisco CCNA Security or similar, CEH, GIAC, Microsoft SC-200
AI-related training or certification will be considered an added advantage.

Experience

Minimum 8-10 years of hands‑on experience in cybersecurity operations (SOC & NOC environments) and security infrastructure management.

Responsibilitiesh3>

The Technical Specialist - Cyber Security is responsible for monitoring, analysing, and responding to security incidents using SIEM and other security tools. They play a critical role in maintaining endpoint and network security, managing access controls, supporting vulnerability and patch management, and ensuring compliance with ISO 27001 and other standards. The role includes regular system hardening, firmware updates, configuration backups, and documentation. The engineer also assists with audit readiness, contributes to threat hunting, and collaborates with internal teams to maintain a secure IT environment.

Key Responsibilities
  • Perform triage and investigation of security events and escalation to the infosec lead when needed.
  • Conduct daily health checks on firewalls, endpoints, security appliances, and SIEM systems.
  • Support and manage endpoint protection platforms, email security, and web filtering systems.
  • Participate in threat hunting activities and analyse suspicious activities or anomalies.
  • Coordinate and support vulnerability assessments and ensure timely patch compliance.
  • Maintain system hardening, secure configurations, and adhere to CIS benchmark standards.
  • Ensure security controls and processes align with ISO 27001, NIST, and other relevant frameworks.
  • Assist in preparing and participating in internal and external ISO audits.
  • Prepare and maintain accurate and up-to-date security process and documentation, audit logs, SOPs and reports.
  • Perform regular configuration backups and firmware updates for security infrastructure.
  • Administer and maintain IAM, MFA and PAM systems to ensure secure access controls.
  • Collaborate with infrastructure and application teams to support secure system operations.
  • Respond to audit findings, implement remediation steps and ensure closure of compliance gaps.
  • Contribute to security awareness by documenting incidents, lessons learned and procedures.
  • Participate in 24/7 on‑call rotation or scheduled maintenance windows when required.
Required Skills and Experience
  • Strong understanding of network security technologies:
  • Firewalls: Palo Alto, Fortigate, Cisco ASA/FTD
  • VPN technologies and Network Access Control (NAC)
  • Hands‑on experience with security operations:
  • SIEM tools for monitoring, log analysis and threat detection
  • Incident response and escalation handling
  • WAF: F5 ASM, Barracuda
  • Endpoint security management: CrowdStrike, Microsoft Defender, SentinelOne, DLP (Forcepoint)
  • Identity and Access Management (IAM): Multi-Factor Authentication (MFA), Privileged Access Management (PAM) (CyberArk)
  • Vulnerability management: Nessus, Qualys, patch management processes
  • Familiarity with ISO 27001, NIST, GDPR, PCI‑DSS and other security compliance standards
  • Experience with:
  • Email security gateways: Proofpoint, Mimecast, Cisco‑ESA
  • Web proxies: Forcepoint, Zscaler, Cisco‑WSA
  • Security hardening and secure configuration practices: CIS benchmarks, system hardening techniques
  • Proficiency in security monitoring and analysis tools: SIEM platforms (e.g. Splunk, QRadar, SolarWinds SEM), SOAR platforms (optional but beneficial)
  • Compliance and security governance: ISO 27001, PCI‑DSS, NIST, GDPR standards
  • Involvement in ISO audits, audit readiness and compliance documentation
  • Regular reviews of all infrastructure components
  • Conducting vulnerability assessments and penetration testing scans, coordinating remediation efforts with relevant teams to mitigate identified risks.
Technical Skills / Competencies
Mandatory

Experience working with enterprise firewalls such as Palo Alto, FortiGate, Cisco ASA/FTD.

Strong hands‑on knowledge of SIEM tools (e.g. Splunk, QRadar, SolarWinds SEM) for log monitoring and threat detection.

Exposure to endpoint protection platforms such as CrowdStrike, Sentinel One, or Microsoft Defender, Forcepoint DLP.

Hands‑on experience with VPN, NAC and network security policies.

Hands‑on experience with WAF (F5 ASM, Barracuda).

Working knowledge of Vulnerability Management tools like Nessus or Qualys.

Proficiency in managing Identity and Access Management (IAM) including MFA and Privileged Access Management (PAM: CyberArk, Delinea, Centrify).

Practical experience with PCI‑DSS, ISO 27001 audits, security documentation and compliance reporting.

Skills in security hardening and application of CIS benchmarks.

Ability to perform firmware upgrades, backup configuration and system maintenance.

Hands‑on experience on email security gateways (e.g. Proofpoint, Forcepoint, Cisco ESA, Mimecast).

Hands‑on experience on Web proxy solutions (e.g. Forcepoint, Zscaler, Cisco WSA).

Optional

Cloud security experience (Azure, AWS or GCP):

  • Antivirus (Symantec)
  • Cloud firewall configurations
  • IAM policies for cloud resources
  • Monitoring and logging in cloud environments
  • Basic scripting and automation for SIEM/SOAR workflows
  • Experience in hybrid or multi-cloud security implementations
  • Experience with AI-based implementation or support will be considered an added advantage.
Soft Skills
Mandatory

Strong analytical and problem‑solving ability.

Excellent written, verbal communication and presentation skills.

Clear and accurate documentation skills.

Proven experience in team leadership and collaboration with the ability to work effectively across departments and foster a cooperative work environment.

High attention to detail and proactive security mindset.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.