Job Description

Overview

To provide hunts in customer environment in order to identify any threat and report it to the client within the agreed SLA.

Ability to handle high-pressure and complex situations.

Analyze complex data to identify vulnerabilities and potential threats and provide reports timeously.

This specific roles will leverage Operational Technologies Tools and Logs.

Responsibilities

  • Exploration and integration of new cybersecurity testing tools, processes, and capabilities.
  • Contribute to the tuning and development of SIEM use cases and other security control configurations to enhance threat detection capabilities.
  • Hands-on, collaborative cybersecurity testing of critical SOC environments, applications, systems, etc.
  • Discover and analyze vulnerabilities.
  • Continuously improve processes for use across multiple detection sets for more efficient operations.
  • Perform in-depth investigation of events of interest identified during threat hunt activities or security alerts received from various security technologies. Liaise with appropriate internal stakeholders during the investigation process to determine whether a security incident has occurred, identify the root cause and provide appropriate recommendations for remediation.
  • Network and system integrity testing (i.e., searching for possible unauthorized behavior/signs of compromise).
  • Proactively hunt for potential malicious activity and incidents across multiple customers using advanced threat network and host-based tools.
  • Identify and perform escalations to the Security Incident Response team.
  • Provide support in the detection, response, mitigation, and reporting of cyber threats affecting client networks with the ability to evaluate IT environments and identify security goals, objectives and requirements.
  • Maintain and employ a strong understanding of advanced threats, continuous vulnerability assessment, response and mitigation strategies used in Cybersecurity operations.
  • Perform risk analysis, attack simulation, application-level automated & manual Ethical Hacking and develop proof-of-concept exploits.
  • Motivating and empowering the team.
  • Active involvement in management discussions.
  • Excellent interpersonal, presentation, and facilitation skills.
  • Self-motivated, curious, and knowledgeable about information security news and current events.
  • Able to work independently.
  • Ability to build relationships and interact effectively with internal and external parties.
  • Good analytical, technical, written, and verbal communication skills.
  • Ability to multi-task in a fast-paced and demanding work environment.
  • Comfortable with a high-tech work environment and constantly learning new tools and innovations.
  • Good working knowledge of Office tools.
  • Self-motivated, curious, and knowledgeable about information security news and current events.
  • Knowledge of OT Environments, Systems and Networks

Qualifications

Skills/ Certifications : -

  • Any related cybersecurity certifications is a plus.
  • Any related SANS OT, IEC/ISA, or OT certifications is a plus

Minimum Work Experience : -

  • Overall 8+ years’ experience working in a large-scale IT environment focusing on Information Security.
  • Minimum 5 years’ experience as Threat Hunter

Education :-

Bachelors degree in Computer Science or Information Technology (Any area)


Job Details

Role Level: Mid-Level Work Type: Full-Time
Country: United Arab Emirates City: Abu Dhabi
Company Website: https://cpx.net/ Job Function: Management
Company Industry/
Sector:
Computer and Network Security

What We Offer


About the Company

Searching, interviewing and hiring are all part of the professional life. The TALENTMATE Portal idea is to fill and help professionals doing one of them by bringing together the requisites under One Roof. Whether you're hunting for your Next Job Opportunity or Looking for Potential Employers, we're here to lend you a Helping Hand.

Report

Similar Jobs

Disclaimer: talentmate.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at abuse@talentmate.com.


Talentmate Instagram Talentmate Facebook Talentmate YouTube Talentmate LinkedIn