No more applications are being accepted for this job
- Work with Analyst team for Alert and incident management
- Alert escalations and SLA validations.
- To monitor health of the SOC solutions.
- Basic understanding and configuration knowledge of SIEM agents.
- Thorough understanding of SIEM architecture and event flow.
- Communicate with external vendors for incident resolutions.
- Minimum 3 years of experience working in a large-scale IT environment with focus on Information Security.
- Flexibility to work on all shifts, and willingness to assist the team with overtime when needed.
- Knowledge of security best practices and concepts
- Must have a solid understanding of information technology and information security.
- Good analytical, technical, written, and verbal communication skills.
- Comfortable with high-tech work environment, and constant learning of new tools and innovations.
- Self-motivated, curious, knowledgeable pertaining to news and current events.
- Any security related certifications
- Should have worked in a SOC environment with thorough knowledge of incident management, reporting and escalation.
- Hands on experience in SIEM tools, preferably ArcSight & SOAR Solution.
- Hands on experience in Threat intel platforms, threat hunting and other analytic tools will be an added advantage.
- Knowledge in creating reports, channels, dashboards etc. using SIEM tool.
- Understanding of incident management lifecycle.
- Should have good understanding of security devices like firewalls, IPS, WAF etc.
SOC Analyst - Dubai, United Arab Emirates - Snaphunt
Description
You will be responsible for :
Desired Candidate Profile
Profile:
Experience/Characteristics
Education:
Bachelor of Science
Gender:
nm
Nationality:
Any Nationality