Explore a SOC Analyst role (Level 1, Level 2, and SOC Lead) with one of our prestigious clients in Dubai — a leading MNC in the consulting sector.
This role spans three levels, each with increasing responsibility and expertise.
The Emiratization - SOC Analyst role is crucial to our client's organization as it aims to connect the cybersecurity domain with nurturing Emirati talent. The individual in this position will play a key role in spearheading initiatives to enhance cybersecurity skills among Emirati talents, reinforcing our client's commitment to Emiratization and cultivating a robust cybersecurity workforce.
Job Objective:
The SOC Analyst monitors, detects, and responds to security incidents within the Cyber Security Operations Center (CSOC). This role spans three levels, each with increasing responsibility and expertise
Level 1 Analyst
Responsibilities:
- Provide 24x7x365 event monitoring, incident detection, and response.
- Analyze outputs from various technologies to identify and triage security incidents.
- Escalate incidents to Level 2 Analysts or handle as per procedures.
- Conduct event analysis from diverse log sources and network packet captures.
- Utilize SIEM technologies and other security tools (anti-DDoS, IPS/IDS, APT detection, Anti-Virus).
- Monitor alerting tools, handle escalated incidents, and develop CSOC documentation.
Qualifications:
- 1-2 years in SOC Analyst role
- Understanding of network infrastructure, security concepts, and cloud security tools.
- Experience with SIEM and EDR tools (RSA NetWitness, Microsoft Sentinel, QRadar, Splunk, Defender, CrowdStrike, Cybereason, Carbon Black).
- Ability to analyze system data and interpret TCP/IP packets.
- Experience in a 24/7/365 environment.
Certifications:
- GIAC Security Essentials (GSEC)
- Certified Security Analyst (ECSA)
- Certified Incident Handler (ECIH)
- Certified Ethical Hacker (CEH)
- CompTIA Security+
_____________________________________________________________________________________________________________________
Level 2 Analyst
Responsibilities:
- Act as a technical escalation point for Level 1 Analysts.
- Analyze security events and recommend containment and remediation actions.
- Monitor for emerging threats and coordinate with L3, Threat Intelligence, and Content Engineering teams.
- Develop and maintain CSOC documentation and provide incident updates to management.
Qualifications:
- 4+ years in information security.
- Experience with network analysis tools, cloud environments, and incident response.
- Proficiency in SIEM and EDR tools (RSA NetWitness, Microsoft Sentinel, QRadar, Splunk, Defender, CrowdStrike, Cybereason, Carbon Black).
Certifications:
- GIAC Certified Enterprise Defender (GCED)
- GIAC Certified Incident Handling (GCIH)
- Offensive Security Certified Professional (OSCP)
- Certified Incident Handler (ECIH), GIAC Continuous Monitoring (GMON)
- Certified Ethical Hacker (CEH)
_____________________________________________________________________________________________________________________
Level 3 Analyst
Responsibilities:
- Conduct advanced threat research, reverse engineering, and malware analysis.
- Perform forensic investigations and risk hunting activities.
- Write threat analysis reports and provide mitigation recommendations.
- Act as a subject matter expert and generate new use cases for emerging threats.
Qualifications:
- 10+ years in information security or cybersecurity, with 2-5 years in cloud security and forensic analysis.
- Experience with scripting languages (Python, Perl, PowerShell), reverse engineering tools, and digital forensics.
- Proficiency in SIEM and EDR tools (RSA NetWitness, Microsoft Sentinel, QRadar, Splunk, Defender, CrowdStrike, Cybereason, Carbon Black).
Certifications:
- GIAC Certified Forensic Analyst (GCFA), GIAC Certified Forensic Examiner (GCFE), GIAC Network Forensic Analyst (GNFA), GIAC Advanced Smartphone Forensics (GASF), EC-Council Computer Hacking Forensic Investigator (CHFI), Mile2 Certified Digital Forensics Examiner, Mile2 Certified Network Forensics Examiner