5 Certified Information Systems Security Professional jobs in the United Arab Emirates
Security Analyst
Posted today
Job Viewed
Job Description
Help AG is looking for a talented and enthusiastic Security Analyst who will have a strong knowledge and interest in network security. The Security Analyst will be responsible for monitoring multiple security technologies and events using the Security Information Event Management (SIEM) tool in order to detect and identify IT security related incidents.
This role requires:
- 2-4 years of experience in information security, in areas such as security operations, intrusion detection, incident analysis, incident handling, log analysis, or firewall administration.
- 2-4 years of experience in one of the following: Network operations or engineering or system administration on Unix, Linux, Windows.
Responsibilities
- Follow detailed operational processes and procedures to appropriately analyze, escalate, and assist in the remediation of critical information security incidents.
- Correlate and analyze events using the Splunk/Log Rhythm/Qradar SIEM tool to detect IT security incidents.
- Conduct analysis of log files, including forensic analysis of system resource access.
- Review customer reports to ensure quality and accuracy.
- Monitor multiple security technologies, such as SIEM, IDS/IPS, Firewalls, Switches, VPNs, and other security threat data sources.
- Respond to inbound requests via phone and other electronic means for technical assistance with managed services.
- Respond in a timely manner (within documented SLA) to support, threat, and other cases.
- Document actions in cases to effectively communicate information internally and to customers.
- Resolve problems independently and understand escalation procedures.
- Maintain a high degree of awareness of the current threat landscape.
- Participate in knowledge sharing with other analysts and writing technical articles for Internal Knowledge Bases.
- Perform other essential duties as assigned.
- Able to work in rotating shifts within a 24/7 operating environment.
Qualifications & Skills
- A Degree in Computer Science, Information Systems, Electrical Engineering, or a closely related degree.
- An active interest in internet security, incident detection, network and systems security.
- A sound knowledge of IT security best practices, common attack types and detection/prevention methods.
- Demonstrable experience of analyzing and interpreting system, security, and application logs.
- Knowledge of the type of events that both Firewalls, IDS/IPS, and other security-related devices produce.
- Experience in using SIEM tools such as Splunk, Log Rhythm, Qradar, Alien Vault, NitroSecurity, etc.
- TCP/IP knowledge, networking, and security product experience.
- Knowledge of Cyber Kill Chain and MITRE ATT&CK frameworks.
- Possible attack activities, such as scans, man in the middle, sniffing, DoS, DDoS, etc., and possible abnormal activities, such as worms, Trojans, viruses, etc.
- CCNA, CISSP, GCA, GCIA, GCIH, CEH certification would be preferable.
- Outstanding organizational skills.
- Exclusive focus and vast experience in IT.
- Strong analytical and problem-solving skills.
- A motivated, self-managed individual who can demonstrate above-average analytical skills and work professionally with peers and customers even under pressure.
- Very good communication skills.
- Strong written and verbal skills.
- Strong interpersonal skills with the ability to collaborate well with others.
- Ability to speak and write in English is required; Arabic is preferred.
Benefits
- Health insurance with one of the leading global providers for medical insurance.
- Career progression and growth through challenging projects and work.
- Employee engagement and wellness campaigns activities throughout the year.
- Excellent learning and development opportunities.
- Inclusive and diverse working environment.
- Flexible/Hybrid working environment.
- Annual flight tickets to home country.
- Open door policy.
About Us
Help AG is the cybersecurity arm of e& enterprise (formerly Etisalat Digital) and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by e& (formerly Etisalat Group) in 2020, hence creating a cybersecurity and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and maintaining its focus on all aspects of cybersecurity. With best of breed technologies from industry-leading vendor partners, expertly qualified service delivery teams, and a state-of-the-art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
#J-18808-LjbffrGroup-IT Security Analyst
Posted today
Job Viewed
Job Description
At GAC Group IT, our dedication to providing top‑notch solutions to 6000+ users worldwide relies on the dependability of our IT systems, all while upholding our ISO 27001 certification. As we grow the GAC Group IT Team, we are actively seeking an IT Security Analyst to bring his/her technological proficiency to enhance our security protocols.
The Group IT team is dedicated to constructing, configuring, maintaining, and enhancing applications throughout their life cycle while safeguarding them against cyber threats.
Key Responsibilities- Implement and maintain security solutions for our network, infrastructure and applications hosted in On‑prem Data Center and Azure Cloud.
- Closely work with Software development & DevSecOps teams to resolve issues.
- Guide GAC branch offices to improve their IT security posture.
- Monitor and respond to security incidents and perform root cause analysis.
- Research and stay updated on the latest security trends and best practices.
- A bachelor’s degree in computer science / information security.
- A minimum of 2 years of experience as an IT Security Analyst or a similar role.
- A proficiency in implementing & managing security tools such as CSPM, VAPT, VMDR, EDR.
- Excellent teamwork, problem‑solving, analytical and communication skills.
- Holding relevant certifications such as Azure Security (AZ‑500), CCSP, etc. will be advantageous.
IAM Security Analyst (UAE National)
Posted today
Job Viewed
Job Description
Company: Al Rostamani Group of Companies LLC
Every employee at Al Rostamani Group plays a role in making a real difference to the business and our customers. We care for our employees by offering them meaningful and purposeful work and an opportunity to grow, learn, contribute and succeed. Today, the Al Rostamani Group has come a long way since its birth in 1957. Our group has grown steadfastly with the guiding principles of Commitment, Care & Vision, alongside a strong sense of active involvement in the community. We are a well-diversified group, with a key presence in industries such as General Trading, Automobiles and Heavy Equipment, Travel, Foreign Exchange, Financial Services, Property Management, Construction, Infrastructure Development and Information Technology Services. Our Group employs approximately 2000 people from 41 different nationalities, which contributes to our multicultural and multi-national environment.
The Identity & Access Management (IAM) Security Analyst is responsible for protecting the organisation’s digital assets by managing identities, access controls, and authentication systems. This role ensures that only authorised users can access sensitive data, enforce the principle of least privilege, and support compliance with security policies and regulations. Working closely with IT Security & Governance, Group Information Technology, and other departments, the Analyst helps implement security measures, monitor for threats, and respond to incidents.
Beyond daily operations, the Analyst develops security protocols, works closely with business units to conduct access reviews and security assessments, and recommends improvements to strengthen the organisation’s cybersecurity posture. The role also involves cross‑functional collaboration, providing actionable insights to senior leadership, and promoting a culture of security awareness across the enterprise.
Technical Responsibilities
- Access Management and Review: Lead and manage the IAM lifecycle, including provisioning, modification, deprovisioning, and access reviews across all systems and applications.
- Security Monitoring and Incident Response: Monitor IAM and SIEM logs and alerts to identify and respond to suspicious activity, unauthorised access, and security incidents.
- Technical Due Diligence: Evaluate new applications for IAM compatibility, focusing on authentication, access controls, scalability, and security compliance.
- Vulnerability Assessment and Penetration Testing: Conduct comprehensive VA/PT across IT infrastructure, including servers, web applications, APIs, and mobile applications.
- Security Configuration Management: Oversee and optimise IAM solutions across cloud platforms, ensuring seamless system integrations and secure access through technical controls such as firewalls, WAF, NAC, and PAM.
- Security Technology Research: Actively research, evaluate, and drive next‑generation security technologies and solutions to meet organisational requirements.
Business Responsibilities
- Audit Coordination and Remediation: Support the coordination of internal and external audits, track security audit findings, and report remediation efforts.
- Policy and Governance: Enforce and support the development of IAM policies, procedures, and best practices, and remediate violations in coordination with IT Operations and Application teams.
- Security Training and Awareness: Assist in developing and delivering security training programs and awareness campaigns for employees.
- Compliance Monitoring: Monitor adherence to IT and security governance frameworks and recommend improvements.
- Vendor Liaison: Liaise with vendors for POCs and demos of new IT security requirements.
Qualifications
- Bachelor's degree or higher in a relevant field.
- Security certifications such as Certified Ethical Hacker (CEH) or CompTIA Security+ are preferred.
Experience
- Proven experience (typically 3+ years) in information security.
Knowledge and Skills
- Strong knowledge of cloud security, cybersecurity frameworks, standards, and best practices.
- Strong understanding of IT governance frameworks, regulatory requirements, and industry standards.
- Excellent communication and interpersonal skills.
- Demonstrated ability to influence and collaborate with cross‑functional teams.
- In‑depth understanding of risk management, compliance, and governance principles.
Experience in managing data protection mechanisms, preferably on cloud platforms like Microsoft Purview.
- Knowledge of the Microsoft Defender Suite and the Identity and Access Management suite.
- Understanding security solutions such as NAC, PAM, EDR, DLP, SIEM, SOAR, and NDR.
- Knowledge of security configurations in cloud platforms, e.g., AWS, Azure, and Microsoft 365.
At Al Rostamani Group, we seek talented people who work hard to achieve great things. We consider not only your skills and experience, but also your passion for the role, your desire to learn and how well you align with our core values of care, commitment and vision. If this position represents an opportunity you wish to pursue, we invite you to apply.
#J-18808-LjbffrInterview Questions for Information Security Analyst
Posted today
Job Viewed
Job Description
Login for faster access to the best deals. Click here if you don't have an account.
Interview Questions for Information Security Analyst Jun 25th, 2025 at 05:44 Learning Dubai 10 views Reference: 5123 Contact us Location: Dubai Price: Contact usInterview Questions for Information Security Analyst roles often focus on key areas like risk management, network security, incident response, and vulnerability assessment. Candidates may be asked about common security tools, threat detection techniques, encryption methods, and how they would handle real-world security incidents. Preparing for these questions helps build confidence and demonstrates the technical knowledge and problem-solving skills required for a successful career in information security.
Send a message #J-18808-LjbffrIT Security Professional - Intermediate - Abu Dhabi
Posted today
Job Viewed
Job Description
We need resources for given below requirement. This is for Abu Dhabi location.
Skillset/technology:
Advanced skills in firewalls managing and troubleshooting ( Cisco /Palo Alto / Fortigate)
Cisco ISE advanced experience
Advanced experience in mail gateways ( Cisco Iron Port and Fortimail )
Advanced experience in Citrix NetScaler
Web proxies advanced experience ( Cisco WSA)
Job Category: IT Security Professional
Job Type: Full Time
Job Location: Abu Dhabi
Apply for this positionFull Name *
Email *
Phone *
Upload CV/Resume * Allowed Type(s): .pdf, .doc, .docx
By using this form you agree with the storage and handling of your data by this website. *
Trusted partner – preparing you for ‘ Beyond Digital ’IRIS STAR Technologies is an IT service company providing consulting and technology solutions to help organizations deliver their strategic objectives. We help businesses transform and evolve quickly to seize the opportunities and help mitigate the risks that digital transformation creates.
- IRIS STAR Technologies LLC.
+971 (0)
Level 20, 48, Burj Gate Tower, Downtown Dubai; P.O. BOX 22061, Dubai, UAE
Be The First To Know
About the latest Certified information systems security professional Jobs in United Arab Emirates !