Company Description
Momentum Corporate Services is a leading entertainment group based in Abu Dhabi, United Arab Emirates. Our portfolio includes mobile game development and publishing, virtual reality experiences, iGaming, esports management, and content platform services. We are dedicated to creating immersive and personalized entertainment experiences that push the boundaries of innovation in the industry.
For more information about Momentum Group, please visit our website at www.mgh.ae.
Role Description
Management of outsourced SOC services & performance
- Acts as the primary interface to the outsourced SOC provider, ensuring SLAs are met and the SOC services align with our security objectives
- Collaborates with the outsourced SOC to ensure the timely detection, analysis and response to security incidents, validating the quality and timeliness of alerts and incident response procedures
- Manages SOC escalations & drives continuous improvement initiatives to enhance SOC effectiveness
- Seeks to identify gaps and improvement opportunities in SOC operations and drives initiatives to improve internal monitoring and response capabilities.
- Provides full visibility into SOC activities, threat landscapes and incident management, supporting informed decision making and our ability to react fast to security events.
Threat intelligence & visibility into emerging threats
- Takes ownership for developing our threat intel capability utilizing threat feeds and data, ensuring we have visibility into emerging threats that are relevant to the business
- Develops processes that translate threat intel feeds into actionable alerts, and ensuring our defenses evolve with the threat landscape
Security Incident Management & Response Coordination
- Leads the internal security incident response efforts in collaboration with the outsourced SOC, the Security Director and internal Incident Management teams, ensuring effective and timely handling, investigation and resolution of security incidents
- Coordinates between the outsourced SOC, Product & Technical Operations teams during incidents to provide a seamless response, root cause analysis and post incident reviews
SOC monitoring & Detection capabilities
- Works with the outsourced SOC and internal technical teams to configure and tune security monitoring tools e.g. SIEM, IDS/IPS, web application firewalls etc., ensuring that alerts are accurate and providing real insight into the threats faced
- Seeks to evaluate and implement additional monitoring tools or capabilities (as necessary) required to enhance detection and response capabilities
- Keeps up to date with new security technologies, methodologies and industry trends, recommending improvements to SOC operations and tools.
Reporting, Metrics and Key Performance Indicators
- Defines and implements a detailed set of metrics and KPIs to evaluate SOC performance, including detection & response times, and incident trends
- Develops regular reports and Exec summaries for the Security Director and other senior stakeholders, providing insights into the threat landscape, SOC performance and overall security posture
- Ensures that reporting processes provide visibility into critical security metrics, providing an accurate view of current threats, incident management and security trends
SOC Policies & Procedures
- Works with the outsourced SOC team and other internal teams to develop and implement SOC related policies, standards and operating procedures, ensuring consistent and effective security operations
- Seeks to continuously refine and enhance SOC processes and workflows, aligning with industry best practices and adapting to changes in the threat landscape
- Ensures all SOC activities, incidents and resolutions are well documented, maintaining a central knowledge base for future reference and improvements
- Develops and maintains internal documentation on SOC processes, incident response protocols and roles/responsibilities of the SOC team
Vulnerability Management
- Coordinate with the outsourced SOC and internal technical teams to perform routine risk assessments and vulnerability scans of the infrastructure, analyzing results and ensuring timely remediation of identified vulnerabilities
- Provides regular visibility and reporting into identified vulnerabilities, risks and mitigation efforts, ensuring an up-to-date risk profile of the business
Collaboration with internal stakeholders
- Serves as a key conduit between the outsourced SOC, internal technical teams and other stakeholders, facilitating better collaboration and alignment between security operations and the business.
- Regularly communicates SOC requirements, findings and recommendations to internal technical teams, ensuring timely and adequate implementation of security measures and mitigations
Experience
- 5-10 years in Security Operations & Cyber Security, focusing on threat detection, incident response and monitoring. Ideally 2-3 years in a managerial role.
- Direct experience in managing outsourced SOC or MSSPs, including overseeing SLAs, service reviews and handling escalations
- Hands on incident response and crisis management experience, managing security incidents from detection to remediation, including coordinating between multiple teams and providing post incident analysis
- Strong familiarity with incident response playbooks, escalation protocols, and the ability to drive timely incident resolution
- Experienced in building & scaling SOC functions e.g. threat monitoring, enhanced detection and response capabilities and establishing SOC processes
- Has developed SOC roadmaps, assessed current capabilities and recommended improvements to align with business needs and the evolving threat landscape
- Proven track record of creating and maintaining SOC metrics e.g. mean time to detect, mean time to respond, false positive rates and incident trends
- Experienced in providing executive level reports to provide insight into threat patterns, SOC performance and overall security posture
- Knowledge of threat intelligence platforms and frameworks e.g. MITRE to understand attack methods
- Strong understanding of network security principles, including firewalls, IDS/IPS, VPNs and segmentation
- Familiarity with cloud security controls e.g. Azure to ensure visibility and protection of cloud assets
- Experience of configuring and optimizing SIEM tools for minimal false positives and relevant alerting
Skills Required
- Deep understanding of security ops, threat detection, vulnerability mgmt., and incident response, with strong skills in managing 3rd party relationships, SLAs and driving accountability of outsourced providers.
- Experienced in leading & coordinating security incident response efforts across internal/external teams
- Solid understanding of SIEM tools, security reporting, KPIs to assess the effectiveness of outsourced SOC monitoring capabilities
- Data driven, able to analyse security information, trends and to provide strategic insights and continuous improvement recommendations
Qualifications
- Bachelor’s or master’s degree in information technology, Computer Science or Cyber Security related field
- Certified Information Systems Security Professional (CISSP)
- Certified Incident Handler (GCIH)
- Certified SOC Analyst (CSA)
- CompTIA CySA+ (Cybersecurity Analyst)
- Certified Cloud Security Professional (CCSP)
- Certified Information Security Manager (CISM)
- CompTIA Cloud+
- Certified Ethical Hacker (CEH)
- SANS SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
- Microsoft Certified: Azure Security Engineer Associate
One or many of these qualifications are preferred.
Offer
- Fantastic new office on Yas Island.
- Opportunity to work for a growing start-up business.
- Chance to work with like-minded professionals.
- A diverse environment with a determination to reach our goals.
- Training and learning opportunities.
- Company benefits which support your health and well-being.
- Relocation support for those who want to move to the UAE.
Interested? Do apply directly with your CV.
#momentumservices #igaming #hiring #UAE #UAEjobs