
Website Majid Al Futtaim
Job Description:
SOC Analyst position is responsible to provide effective management and technical direction over organization wide vulnerability and threat management program across all Network, Endpoints and Server infrastructure. This includes activities ranging across security monitoring operations, threat analysis, vulnerability assessments and penetration testing, SIEM monitoring. This position also works closely with other functions at the Group level to assist in the security monitoring program as well as the incident response and recovery capability
Job Responsibilities:
- Works directly with data asset owners and business response plan owners during high severity incidents
- Applications are assessed for vulnerabilities both periodically as well as before being deployed in the live environment are captured and updated
- Triage and resolve advanced vector attacks such as botnets and advanced persistent threats (APTs)
- Technical vulnerability management should be implemented in an effective, systematic, and repeatable way with measurements taken to confirm its effectiveness
- Virus protection arrangements are established and maintained throughout the organization
- Detection, prevention, and recovery controls to protect against malicious and mobile code are implemented
- Provide tuning recommendations to administrators based on findings during investigations or threat information reviews
- Monitor industry trends to ensure that solutions are in line with industry best practices.
- Timely information about technical vulnerabilities in information systems is made available to evaluate the exposure to the vulnerabilities and countermeasures should be taken to address the associated risk * Tuning of
- security tools policy based on threat feeds, incidents, or vulnerabilities and exploits of downstream systems
- The threat and vulnerability database is maintained and kept up to date to ensure environmental threats
- Provide first responder forensics analysis and investigation, drives containment strategy during data loss or breach events
Job Requirements:
- Demonstrated excellent communication skills and ability to work with teams and external stakeholders is essential
- Incident response, triaging, threat mitigation tactics
- Must be able to take actions necessary to protect the organization from an existential cyber threat that is ongoing or an imminent threat
- Knowledge in all aspects of vulnerability management including network vulnerability assessment, web application testing
- Tuning of security tools policy based on threat feeds, incidents, or vulnerabilities and exploits of downstream systems
- Provide tuning recommendations to administrators based on findings during investigations or threat information reviews
Qualification & Experience:
- Bachelor’s degree in Computer Science, Engineering; or a science degree
- Minimum of 8 years of experience in AV, EDR, Endpoint Security vulnerability management, and threat management
- Knowledge of security frameworks and best practices including ISO 27001, OWASP, ZAP etc.
- CCNP, CISA, CISSP, CompTIA Security, CEH
Job Details:
Company: Majid Al Futtaim
Vacancy Type: Full Time
Job Location: Dubai, United Arab Emirates
Application Deadline: N/A
Jobaric.com