Key Responsibilities
- Continuously monitor security alerts from SIEM tools, EDR (e.g., CrowdStrike, SentinelOne), and other security tools to identify malicious activity.
- Investigate security events, alerts, and logs to determine the severity, scope, and impact of potential incidents.
- Execute our incident response plan to contain, eradicate, and recover from confirmed security incidents.
- Proactively search through networks and datasets to detect and isolate advanced threats that evade traditional security solutions.
- Create detailed incident reports and documentation for technical and executive audiences, ensuring lessons learned are applied.
- Provide feedback to improve and optimize SIEM rules, alerts, and use cases to reduce false positives and enhance detection capabilities.
- Work closely with other IT teams to implement corrective actions and improve the organization's overall security posture.
- Keep abreast of the latest cybersecurity threats, vulnerabilities, attack techniques, and threat intelligence sources.
Preferred Skills
- Security certifications (e.g., CISSP, CEH, GCIH, CompTIA Security+)
- Experience with cloud security (AWS, Azure, GCP)
- Experience with Security platform like Trend Micro, Crowd Strike, checkpoint, perception point, Microsoft Defender will be an added advantage.
Required Qualifications
- Bachelor’s degree in Cybersecurity, Computer Science, or related field
- 2+ years of experience in a SOC or cybersecurity role
- Proficiency with SIEM platforms (e.g., Splunk, QRadar, Microsoft Sentinel)
- Strong understanding of network protocols, firewalls, IDS/IPS, and endpoint protection
- Familiarity with MITRE ATT&CK framework and threat intelligence platforms
- Strong analytical and problem-solving skills with a keen attention to detail.
- Strong communication and documentation abilities
Email : IT@ACERO.AE
Job Type: Full-time
Pay: AED5,000.00 - AED8,000.00 per month