To proactively identify, analyze and mitigate any cyber threats to flydubai’s digital assets by collaborating with Security Operation Center (SOC), Managed Services Partners, and Dubai Electronic Security Center (DESC) teams to develop analytical methods for detecting advanced and complex cyber threats targeting flydubai IT systems.
- Develops and executes advanced threat hunting hypotheses based on diverse sources, including threat intelligence and security alerts.
- Reviews and analyzes threat intelligence data and indicators of compromise (IOCs) to proactively detect emerging threats.
- Utilizes a variety of tools and techniques, such as network analysis, endpoint forensics, malware analysis, log analysis, and data analytics, to hunt for and investigate potential threats.
- Documents and communicates findings, recommendations, and remediation actions resulting from threat hunting activities to relevant stakeholders.
- Coordinates and collaborates with other security teams, such as incident response, threat intelligence, vulnerability management, and security operations, to share threat hunting insights and best practices.
- Ensures the continuous update and improvement of threat hunting methodologies, processes, and tools to enhance detection capabilities.
- Develops and maintain tools, techniques, and procedures (TTPs) for effective threat hunting activities.
- Stays abreast of the latest cyber threats, trends, and technologies to inform and refine threat hunting practices.
- Assists in defining offensive security strategies and assessment methodologies to enhance overall security posture.
- Conducts comprehensive analysis of system, network, and application logging to identify attack techniques at all stages of the cyber kill chain.
- Bachelor's Degree (3+ years)
- Degree in Information or Cyber Security
- Fluent in English
- 8+ years of experience in a technical role in the areas of Security Operation, Incident Response, Detection Engineering, Offensive Security/Red Teaming, or Cyber Threat Intelligence. Direct experience performing threat hunting in a corporate environment using Structured (hypothesis & data driven) & Unstructured (intuitive & exploratory) hunting methodologies. Experience analyzing system, network, and application logging for attack techniques at all stages of the cyber kill chain. Familiarity with offensive security strategies and assessment methodology Previous experience performing digital forensics or incident response on major security incidents. Experience working with very large datasets and log analysis tools including but not limited to: Splunk, Python, Pandas, SQL, Hadoop, Hue. Experience in consuming and analyzing Cyber Threat Intelligence for actionable take aways.
- Experience with more than one or more enterprise scale EDR, NDR, UEBA and SIEM tools. Experience with scripting and automation (e.g., Python, PowerShell).
- 12 - 14 years
- Certified Ethical Hacker (CEH). GIAC Certified Incident Handler (GCIH). GIAC Certified Forensics Analyst (GCFA). Offensive Security Certified Professional (OSCP).