Position: SOC Analyst
Location: Dubai, UAE
Salary: AED 12,000 – 14,000 per month (depending on experience and qualifications)
Employment Type: Full-time Confidential – Company name will be disclosed during the
Job Summary We are seeking a skilled SOC Analyst to join a dynamic security operations team protecting critical information systems. The role focuses on identifying, assessing, and mitigating security risks through real-time monitoring, incident analysis, response, and compliance with industry standards. The ideal candidate is proactive, highly detail-oriented, and combines strong technical expertise with excellent analytical abilities.
Key Responsibilities
Security Monitoring
- Monitor SIEM dashboards (e.g., Microsoft Sentinel) and security alerts in real time.
- Track and analyze events from security tools (e.g., Microsoft Defender).
- Identify suspicious activities, anomalies, or policy violations.
Incident Triage & Response
- Perform initial investigation and classification of alerts (false positive vs. true positive).
- Collect and review logs, event details, reputation data, and indicators of compromise (IOCs).
- Escalate confirmed or high-severity incidents to L2/L3 analysts with clear documentation.
- Initiate predefined response actions (e.g., isolating devices, forcing password resets, blocking IPs).
Threat Analysis
- Validate IOC hits against threat intelligence sources.
- Analyze phishing emails, malware infections, malicious URLs/attachments, credential-harvesting attempts, and unauthorized access.
- Identify trends across alerts to support proactive threat detection.
Documentation & Reporting
- Create detailed incident tickets and investigation notes.
- Conduct root cause analysis and prepare incident reports with remediation recommendations.
- Maintain accurate incident timelines and updates in the ticketing system.
- Generate reports on recurring or trending issues.
Collaboration
- Work closely with the Security Team and internal IT stakeholders.
- Communicate effectively with end-users to validate suspicious activities or login attempts.
- Adhere to established SOPs and contribute to process improvements.
Security Awareness and Training
- Deliver security awareness training to employees on best practices (e.g., password management, phishing prevention).
- Create and distribute educational materials on emerging cyber threats.
Threat Intelligence and Research
- Stay current on the latest cyber threats, vulnerabilities, and attack vectors.
- Review threat intelligence reports and apply insights to strengthen organizational security posture.
Required Qualifications
- Bachelor’s degree in Engineering, Computer Science, or a related field.
- 5–7 years of experience in SOC operations.
- At least 3+ years of hands-on experience in SOC, blue team, or security engineering roles.
- Proven expertise with Microsoft Sentinel, Microsoft Defender, incident management, and compromised account recovery.
Technical Skills
- Strong understanding of TCP/IP, Windows/Linux internals, and AWS/Azure security controls.
- Scripting/automation skills (Python, Bash, or PowerShell).
- Familiarity with MITRE ATT&CK framework and threat-hunting methodologies.
Certifications (Highly Desirable)
- CompTIA Security+, Microsoft SC-200, CEH, CCNA Security, or CCNP Security.
Soft Skills
- Analytical mindset with strong investigation and documentation discipline.
- Clear verbal and written communication skills for incident briefings and executive-level reporting.
- Ability to multitask and remain calm under pressure in a fast-paced environment.
Nice to Have
- Experience with Zero Trust architecture implementations.
- Knowledge of privacy regulations (e.g., UAE PDPL, GDPR).
Interested candidates are invited to apply by sending a CV. Shortlisted applicants will receive details about the employer during the screening process.
We encourage applications from qualified professionals seeking a challenging role in a growing cybersecurity environment. Only shortlisted candidates will be contacted.