Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Job Location: Abu Dhabi, UAE
Type: Contract
The Company requires an onsite information security specialist to support its security operations. This resource will be an internal stakeholder for all the coordination activities with all teams (network, system and helpdesk) to remediate incidents proactively, help with cyber security operations, liaise with SOC, and act as a single point of contact between the Company and SOC for:
- Security incident resolution
- Implementation of SOC recommendations.
- Security device handling and configuration optimization
Investigate endpoint incidents from an internal exposure standpoint using the tools that SOC does not have access to. This requirement also ensures that the security operations are not hampered in the absence of the CISO and helps to enhance the operational security with additional hands of support for enforcing and managing the governance controls.
Experience:
- 5+ years of experience in Information Security domain.
- Knowledge on International Standards such as NIST, ISO27000, PCI-DSS, COBIT, Cyber Security standards, with technical hands-on security controls.
- Working experience within Security Operations, Cybersecurity Design, NOC/SOC support, Vulnerability management, MSSP environments.
- Have a detailed knowledge of tactics, techniques and procedures used by threat actors, and the ability to analyse data to identify anomalous and malicious behaviour.
Interested candidate please share your Cv at [email protected]