Overview

SOC Analyst/L2 Jobs in Dubai, UAE/Dubai at Dicetek LLC

Title: SOC Analyst/L2

Company: Dicetek LLC

Location: Dubai, UAE/Dubai

Type: Full Time

Category: IT/Tech, Security

Job Role

: SOC Analyst (L2)  Responsibilities  Monitor and analyse the organization’s networks and systems on a daily basis to detect, identify, investigate, and mitigate potential threats. Identify anomalous behavior, recognize patterns of malicious activity, and take appropriate corrective action Follow detailed operational process and procedures to appropriately analyse, escalate, and assist in remediation of critical information security incidents. Correlate and analyse events using the Splunk/Log Rhythm SIEM tool to detect IT security incidents.

Conduct analysis of log files, including forensic analysis of system resource access. Monitor multiple security technologies, such as SIEM, IDS/IPS, EDR, Firewalls, Switches, VPNs, and other security threat data sources. Respond to inbound requests via phone and other electronic means for technical assistance with managed services. Respond in a timely manner (within documented SLA) to support, threat, and other cases.

Document actions in cases to effectively communicate information internally and to customers. Resolve problems independently and understand escalation procedure. Maintain a high degree of awareness of the current threat landscape. Perform other essential duties as assigned. Able to work in rotating shifts within a 24/7 operating environment.

Qualifications & Skills

3-5 years of experience in Security Operations, Incident response and monitoring , threat hunting etc. A Degree in Computer Science, Information Systems or equivalent. CCNA, CompTIA CySA+, CISSP, GCA, GCIA, GCIH, CEH, SIEM-specific certifications would be preferable. An active interest in internet security, incident detection, network and systems security. A sound knowledge of IT security best practices, common attack types and detection/

prevention

methods.

Demonstrable experience of analysing and interpreting system, security, and application logs. Knowledge of the type of events that both Firewalls, IDS/IPS, and other security related devices produce. Experience in using SIEM tools such as Splunk & Log Rhythm. TCP/IP knowledge, networking, and security product experience. Knowledge of Cyber Kill Chain and MITRE ATT&CK frameworks. Possible attack activities, such as scans, man in the middle, sniffing, DoS, DDoS, etc.

and possible abnormal activities, such as worms, Trojans, viruses, etc. Ability to analyse data, such as logs or packets captures, from various sources within the enterprise and draw conclusions regarding past and future security incidents Strong analytical and

problem-solving skills

. Very good

communication skills

. Strong interpersonal skills with the ability to collaborate well with others.

#J-18808-Ljbffr

 

Upload your CV/resume or any other relevant file. Max. file size: 800 MB.