Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Responsibilities:
- Follow detailed operational processes to analyze, escalate, and remediate critical information security incidents.
- Correlate and analyze events using SIEM tools (e.g., Splunk, Log Rhythm, Qradar) to detect IT security incidents.
- Conduct forensic analysis of system resource access by analyzing log files.
- Review customer reports ensuring they are of high quality and accuracy.
- Monitor various security technologies such as SIEM, IDS/IPS, Firewalls, Switches, and VPNs.
- Provide technical assistance to customers through inbound requests.
- Respond to support, threat, and other cases within documented SLAs.
- Document actions taken in cases to maintain efficient communication.
- Maintain current awareness of the threat landscape.
- Participate in knowledge sharing and contribute to internal knowledge bases.
- Work in rotating shifts within a 24/7 operating environment.
- 2-3 years of experience in information security (security operations, intrusion detection, incident analysis).
- Experience in network operations, engineering, or system administration (Unix, Linux, Windows).
- Bachelor's Degree in Computer Science, Information Systems, Electrical Engineering, or a related field.
- Knowledge of IT security best practices and common attack types.
- Experience with SIEM tools (e.g., Splunk, Qradar).
- Strong knowledge of TCP/IP and networking fundamentals.
- Proficiency in English and Arabic (written and spoken).
- Certifications such as CCNA, CISSP, GCA, GCIA, GCIH, CEH.
- Familiarity with Cyber Kill Chain and MITRE ATT&CK frameworks.
- Experience with abnormal activity analysis (e.g., worms, Trojans).
- Outstanding organizational and interpersonal skills.
- Location: Abu Dhabi, UAE (Emirati nationals preferred)
- Working Hours: 24/7 rotating shifts required.
Key Skills
Ranked by relevanceReady to apply?
Join emagine and take your career to the next level!
Application takes less than 5 minutes

