Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
**Please note that the job is on-site in Dubai, relocation is a must (company sponsor)**
About the role:
This role will be responsible for managing the full lifecycle of security alerts, covering triage, enrichment, investigation, and escalation. This position combines traditional Level 1 and Level 2 responsibilities, ensuring accountability and faster response times, while also contributing to threat hunting and continuous improvement of detection capabilities.
Key Responsibilities:
- Triage, enrich, and investigate security alerts, escalating when necessary with clear documentation.
- Execute and improve incident response runbooks to strengthen efficiency and accuracy.
- Conduct structured threat-hunting activities on new vulnerabilities, emerging threats, and adversary techniques.
- Support containment and investigation for high-priority incidents.
- Validate vulnerability signals and collaborate with remediation teams.
Qualifications:
- Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or a related field (or equivalent practical experience).
- 4+ years of experience in Securit Engineering, incident response, or security monitoring role.
- Knowledge of security frameworks and methodologies (MITRE ATT&CK, NIST, ISO 27001).
- Experience with SIEM, EDR, or cloud security platforms.
- Professional certifications such as GCIH, GCFA, CompTIA Security+, or equivalent are a strong plus.
Must Have:
- Proficiency in log-query languages such as KQL, SPL, or equivalent SIEM/XDR query syntax.
- Strong ability to interpret endpoint, identity, and cloud telemetry (e.g., EDR alerts, Azure AD sign-ins, AWS CloudTrail logs).
- Excellent written communication skills, with the ability to produce clear investigative reports and executive-level summaries.
- Adherence to procedural discipline with a mindset for improvement.
- Familiarity with Python or PowerShell scripting is advantageous.
What we offer:
- Competitive Compensation: Enjoy a salary package tailored to your skills and experience, along with performance-based bonuses.
- Comprehensive Benefits: We support your well-being with meal allowances, and assistance with work visa processing.
- Work-Life Balance: Unwind with generous holiday and New Year bonuses.
- Top-Tier Equipment: Stay productive with the latest tools, including a MacBook and iPhone.
- Thriving Culture: Immerse yourself in a dynamic, inclusive work environment that fosters growth.
- Employee Support: Enjoy twice-yearly expense reimbursements for home visits.
Key Skills
Ranked by relevanceReady to apply?
Join AGAPI and take your career to the next level!
Application takes less than 5 minutes