10 Cyber Threats jobs in the United Arab Emirates

Interview Questions for Information Security Analyst

New
Dubai, Dubai OnlineBestAds

Posted today

Job Viewed

Tap Again To Close

Job Description

Login for faster access to the best deals. Click here if you don't have an account.

Interview Questions for Information Security Analyst Jun 25th, 2025 at 05:44 Learning Dubai 10 views Reference: 5123 Contact us Location: Dubai Price: Contact us

Interview Questions for Information Security Analyst roles often focus on key areas like risk management, network security, incident response, and vulnerability assessment. Candidates may be asked about common security tools, threat detection techniques, encryption methods, and how they would handle real-world security incidents. Preparing for these questions helps build confidence and demonstrates the technical knowledge and problem-solving skills required for a successful career in information security.

Send a message #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Manager - Information Security

New
Dubai, Dubai Qataryello

Posted today

Job Viewed

Tap Again To Close

Job Description

Our client is a well-established financial services organisation in Jeddah.

The Senior Manager - Information Security will:

  • Support the CISO in developing and executing the information security strategy and roadmap
  • Contribute to long term planning and act as a key advisor on technical risks
  • Serve as acting CISO as and when required
  • Evaluate and recommend security technologies, tools and methodology ensure the organisation complies with SAMA cybersecurity framework and NCA
  • Lead technical input for audits and regularities reviews
  • Oversee security monitoring, threat and vulnerability management activities
  • Lead incident response efforts
  • Collaborate with IT, compliance, audit and other business unit
  • Report Information Security KPIs and metrics to executive management
  • Represent the Information Security function internally and externally as require

The Senior Manager - Information Security will be/have:

  • A Bachelor's or Master's degree in Information Technology, Computer Science or other relevant fields of study
  • 6+ years of experience in Information Security, ideally within the Banking/Financial Services sector
  • Expertise in information security architecture and engineering
  • Strong understanding of Information Security frameworks such as ISO2700
  • Relevant certifications such as CISSP, CISM, CCISO, etc. would be preferred
  • Excellent knowledge of Saudi regulatory requirements (SAMA, NCA, etc.)
  • Track record in designing secure systems and leading cyber security initiatives
  • Strong project management skills
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security - Specialist (Operations)

New
Sharjah, Sharjah GSS Group

Posted today

Job Viewed

Tap Again To Close

Job Description

Overview

The Information Security - Specialist will report directly to the Information Security Manager and will be responsible for implementing and managing security measures to protect the Bank's information assets. This role focuses on proactive threat detection, incident response, and vulnerability management across all technology domains, including endpoints and cloud environments. In collaboration with IS management, the Specialist will identify gaps in existing information security policies, standards, guidelines, and procedures, recommending updates to ensure alignment with regulatory requirements, industry best practices, and leading security standards.

JOB CONTEXT/ DIMENSIONS The IS Specialist will be responsible for overseeing security technologies like Cloud Security, DLP, Kubernetes, API security, SIEM and EDR, and ensuring compliance with standards and policies. Responsibilities include managing incident response, performing risk assessments, and optimizing security tools across cloud and network environments. The position requires collaboration with internal teams and external stakeholders to enhance security posture and mitigate threats.

Responsibilities
  • Assist in developing and implementing the information security strategy and roadmap across all security technology domains.
  • Research and analyze security standards, systems, and authentication protocols, providing recommendations to IS management.
  • Review architectural security designs, Data flow and offer recommendations for approval by IS management.
  • Enforce security policies and control across cloud environments to ensure a secure infrastructure.
  • Manage and optimize CSPM tools to continuously monitor and enforce security best practices within cloud environments like Azure.
  • Lead cloud incident response efforts, investigating and addressing threats in real-time to mitigate potential security risk.
  • Lead the ongoing management of DLP technologies to protect sensitive data from unauthorized access and leakage.
  • Regularly review and update DLP policies to reflect changes in business needs, technologies, and regulatory requirements.
  • Identify and assess security risks in APIs and Kubernetes by evaluating access control, misconfigurations, and vulnerabilities.
  • Enforce security policies and controls for APIs and Kubernetes.
  • Oversee the management, optimization, and tuning of the SIEM platform to ensure effective security incident monitoring.
  • Conduct deep-dive investigations into security alerts and collaborate with teams to resolve incidents efficiently.
  • Conduct regular security audits and reviews to ensure compliance with internal policies and industry standards.
  • Manage the deployment and operational effectiveness of EDR solutions to monitor, detect, and respond to endpoint threats.
  • Lead incident response for security breaches, including investigation, containment, eradication, and recovery.
  • Provide post-incident analysis, identify lessons learned, and improve future response strategies.
  • Monitor the bank’s networks for security breaches and investigate violations as they occur.
  • Advise IS management on emerging security trends and best practices, assist in updating security policies and procedures, and support departments in investigating breaches and pursuing disciplinary or legal actions as needed.
  • Contribute to team efforts by accomplishing related results as needed.
  • Perform other duties as may be assigned by IS management.
Independence of Operation

• Work within framework of bank’s information security policies, standards, guidelines and procedures as applicable.

• Work accomplishments will be reviewed by the Information Security Manager.

Education and Qualifications
  • Bachelor’s degree in computer science, Network/ Cyber Security or related information technology field.
  • Professional / Technical Qualifications / Diplomas: Platform specific (e.g., SIEM/ Networking/ Operating System) certifications.
  • Security (e.g. SANS/ ISC2 / CEH/ CISSP) certifications
Experience

8 - 10 years’ experience in Information Security or related field.

Role Competencies

• In-depth knowledge and understanding in information security and technology infrastructure, ensuring robust protection of systems and applications.

• Expertise in enforcing cloud security policies, IAM configurations, and data protection practices to ensure a secure infrastructure.

• Proficient in managing and optimizing CSPM tools to continuously monitor and enforce security best practices.

• Experienced in reviewing and enhancing security configurations and architectures to align with industry best practices and compliance requirements.

• Proficient in managing API and Kubernetes security policies, including implementing posture management, access controls, encryption, and continuous monitoring to ensure a secure environment.

• Skilled in conducting thorough vulnerability assessments and comprehensive risk analyses, prioritizing risks and implementing remediation strategies to secure systems.

• Proficiency in configuring and managing DLP tools, data classification, policy enforcement, risk assessment, compliance knowledge, and integrating with security systems to prevent unauthorized data loss.

• Skilled in configuring, optimizing, and managing Security Information and Event Management (SIEM), EDR, and DAM platforms for real-time threat detection and effective incident response.

• Committed to enhancing organizational security posture through ongoing monitoring, assessment, and optimization of security tools and processes.

• Demonstrates innovative thinking by exploring alternative approaches and developing conceptual frameworks to address complex security challenges.

• Possesses strong communication skills, capable of conveying complex security concepts to senior non-technical stakeholders in clear, jargon-free language.

• Adept at managing multiple concurrent projects, effectively prioritizing tasks to meet organizational demands and deadlines.

#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Principal Information Security Consultant

New
Abu Dhabi, Abu Dhabi CyberGate

Posted today

Job Viewed

Tap Again To Close

Job Description

Principal Information Security Consultant

Abu Dhabi, United Arab Emirates | Posted on 08/18/2025

CyberGate Defense, an IHC company, is a leading force in cybersecurity innovation, dedicated to enhancing the digital resilience of organizations across the region. Established with the mission to fortify the region’s cybersecurity landscape, CyberGate harnesses extensive expertise to tackle complex information security and operational challenges.

Our commitment to driving progress is reflected in our broad range of cybersecurity services and solutions. By leveraging cutting-edge, disruptive technologies, we deliver transformative, human-centric security solutions that safeguard organizations and empower them to navigate a secure and dynamic digital future.

With a wealth of in-house knowledge, CyberGate Defense is well-equipped to address the most intricate cybersecurity issues. We strive to make digital transformation secure, accessible, and beneficial, ensuring that organizations throughout the region thrive in an increasingly interconnected digital world.

Job Description

Job Description:

The Principal Information Security Consultant shall be the primary technical liaison between our clients and our internal security teams. In this critical role, the consultant will leverage their deep understanding of information security concepts and technical expertise to bridge the gap between client needs and the specialized teams, including Security Operations Center (SOC), Vulnerability Assessment and Penetration Testing (VAPT), Azure Security, and Governance, Risk, and Compliance (GRC). This is an individual contributor role with no direct reports or managerial responsibilities.

Key Responsibilities:

  1. Act as the primary point of contact for clients, translating their information security requirements and concerns into actionable tasks for CyberGate's internal teams.
  2. Provide expert guidance and consultation to clients on a wide range of information security topics, including threat landscapes, best practices, and emerging technologies.
  3. Collaborate closely with SOC teams to understand incident response activities, provide client-facing updates, and help clients interpret security alerts and reports.
  4. Work with VAPT teams to articulate client scope, interpret vulnerability reports, and advise clients on remediation strategies and prioritize findings.
  5. Liaise with Azure security specialists to understand cloud security posture, discuss architecture, and provide recommendations to clients for securing their Azure environments.
  6. Engage with GRC teams to ensure client compliance needs are met, assist in policy development, and help clients navigate regulatory frameworks.
  7. Conduct technical deep-dives and provide high-level architectural insights to both clients and internal teams to facilitate effective security solutions.
  8. Develop and deliver clear, concise, and technically accurate documentation, reports, and presentations for clients and internal stakeholders.
  9. Stay up-to-date with the latest information security trends, vulnerabilities, and technologies to provide proactive and informed advice.

Qualifications:

  • Extensive experience in information security, with a strong foundational understanding across various domains (e.g., network security, application security, cloud security, incident response, compliance).
  • Demonstrable technical proficiency to effectively communicate and collaborate with specialized security teams (SOC, VAPT, Azure, GRC).
  • Proven ability to translate complex technical information into understandable terms for both technical and non-technical audiences.
  • Exceptional client-facing communication and interpersonal skills, with a track record of building strong client relationships.
  • Strong analytical and problem-solving abilities, with a keen eye for detail.
  • Ability to work independently and manage multiple client engagements simultaneously in a fast-paced environment.
  • Relevant industry certifications (such as CISSP, CISM, CISA, CCSP) are highly desirable.

Education:

Bachelor’s degree in computer science, Information Security, or a related technical field. A master’s degree is a plus.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Manager Information Security RR-0269494

New
Dubai, Dubai DXC Technology Inc.

Posted today

Job Viewed

Tap Again To Close

Job Description

Manager Information Security RR- page is loaded# Manager Information Security RR- locations: ARE - DU - DUBAItime type: Full timeposted on: Posted Todayjob requisition id: **Job Description:***Essential Job Functions:** • Manage a team of security professionals, assigning tasks and monitoring their progress. • Implement and enforce security policies and procedures, ensuring staff adherence. • Monitor security incidents and vulnerabilities, responding promptly to mitigate risks. • Collaborate with other departments to address security concerns and implement security solutions. • Assist in compliance efforts related to security, ensuring the organization's adherence to relevant regulations. • Participate in incident response and investigation, identifying security breaches and implementing corrective actions. • Provide guidance on security technologies and practices, contributing to security strategy. • Prepare and deliver security reports to senior management and relevant stakeholders. **Basic Qualifications:** • Bachelor's degree in a relevant field or equivalent combination of education and experience • Typically, 7+ years of relevant work experience in industry, with a minimum of 3 years in a similar role • Proven experience in information security management • Proficiencies in risk management, compliance, and security technologies • A continuous learner that stays abreast with industry knowledge and technology **Other Qualifications:** • Advanced degree in a relevant field is a plus • Relevant certifications such as CISSP, CISM, or CISA are a plusAt DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.**Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available** ***.***DXC Technology (NYSE: DXC) helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates. Learn more about how we deliver excellence for our customers and colleagues at . #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Chief Information Security Officer - Product Line

New
Dubai, Dubai Binance

Posted today

Job Viewed

Tap Again To Close

Job Description

Binance is a leading global blockchain ecosystem behind the world’s largest cryptocurrency exchange by trading volume and registered users. We are trusted by over 280 million people in 100+ countries for our industry-leading security, user fund transparency, trading engine speed, deep liquidity, and an unmatched portfolio of digital-asset products. Binance offerings range from trading and finance to education, research, payments, institutional services, Web3 features, and more. We leverage the power of digital assets and blockchain to build an inclusive financial ecosystem to advance the freedom of money and improve financial access for people around the world.

The product line Chief Information Security Officer, reporting to the Global Chief Security Officer, aims to develop and implement a comprehensive information security strategy for one of the leading product lines in the Binance product suite. The role will also ensure that the IT Governance and Security Risk Management Systems align to international best practices and adhere to regulatory requirements.

Responsibilities
  • Experience and expertise in Defi security including blockchain, smart contracts, wallet security, and random number generation.
  • Hands‑on implementation of the IT Security Risk Management function.
  • Lead Security Risk Management with all stakeholders as per Security Risk Framework.
  • Work as part of the three lines of defense model to ensure funds, data and systems are secure.
  • Ensure all security obligations for governance, regulatory and compliance matters are delivered.
  • Assist the delivery of the internal and external audits related to Technology and Security.
  • Drive cyber threat & vulnerability management/penetration tests.
  • IT security risk management for new projects and/or any integration with third party vendors.
  • Manage Third party integrations risk to ensure alignment with security standards and SLAs.
  • Security incident management, including prompt reporting to senior management & other teams.
  • Facilitate continual alignment to regulatory compliance obligations and international standards.
Requirements
  • Track record of international company experience and cyber security in a regulatory context.
  • A combination of senior management and deep cyber security experience is mandatory.
  • Security community contributor either through published material or international conferences.
  • Demonstrable experience in a global team with a rich multicultural fast paced environment.
  • 10+ years of experience in security & technology compliance in a global firm.
  • Bachelor's degree or higher in information technology, cyber security or related field.
  • Track record in self motivated leadership and excellent communication and listening skills.
  • Proven management of cyber security operations with hands‑on implementation skills.
  • Delivery of best practices for international data privacy and information security frameworks.
  • NIST Cybersecurity & Privacy Framework, ISO 27001/ISO 27701, CIS and PCI-DSS.
  • Must seek excellence by default and show a passion for collaboration and team achievement.
  • Demonstrable experience delivering effective business and technical security solutions.
  • A passion for the latest cyber security trends and emerging threats is essential.
Why Binance
  • Shape the future with the world’s leading blockchain ecosystem
  • Collaborate with world‑class talent in a user‑centric global organization with a flat structure
  • Tackle unique, fast‑paced projects with autonomy in an innovative environment
  • Thrive in a results‑driven workplace with opportunities for career growth and continuous learning
  • Competitive salary and company benefits
  • Work‑from‑home arrangement (the arrangement may vary depending on the work nature of the business team)

Binance is committed to being an equal opportunity employer. We believe that having a diverse workforce is fundamental to our success.

By submitting a job application, you confirm that you have read and agree to our Candidate Privacy Notice .

#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

CSO - Information Security Assistant Manager - Abu Dhabi Branch

New
Abu Dhabi, Abu Dhabi Intesa Sanpaolo Group

Posted today

Job Viewed

Tap Again To Close

Job Description

CSO - Information Security Assistant Manager - Abu Dhabi Branch

Date: Sep 10, 2025

Location:

Abu Dhabi, AE

Information Security Senior Assistant Manager operates in close cooperation with the local Information Security Officer (ISO) and with the Head Office teams to ensure the definition of the objectives for the Cybersecurity and Business Continuity Programs and monitors compliance with such objectives.

Specific accountabilities of the Information Security Assistant Manager in support of the local ISO:

  • Responsible for the oversight of the state of information security and cybersecurity and provides periodic reports (at least annually) on the state of information security to Top management
  • Adopt, implement and update Cybersecurity policies, rules, processes and procedures in line with Head Office regulatory Framework
  • In reporting to the Top Management, considers to the extent applicable the confidentiality of Nonpublic Information and the integrity and security of Information Systems, the cybersecurity policies and procedures, the material cyber risks, the overall effectiveness of information security and cybersecurity program and possible material cybersecurity events involving the branch
  • Work strategically with Head Office to ensure that all aspects of information security and cybersecurity are properly monitored and that security projects and tasks are properly coordinated
  • Perform continuous monitoring of Information Security and Cybersecurity programs to ensure compliance with objectives, policies and procedures
  • Identify and evaluate changes in local regulations, as well as trends in the Information Security and Cybersecurity sector, such as new products, new attacks and new countermeasures for applicability inside the Branch environment
  • Ensure the local execution of Business Continuity activities, including periodical Business Impact Analysis, tests and reporting, in line with the Group model.
  • Work with information owners in business units to determine appropriate security objectives
  • Monitor network activity for malicious activity
  • Monitor and evaluates vulnerability reports, vendor hot-fixes, and vendor patches for applicability to deployed technologies
  • Monitor the process of creating, changing, or removing user access across all systems
  • Monitor the access control program. Ensure that all appropriate documentation pertaining to the recording of account creations, deletions, and permissions are correctly maintained and approved
  • responsible for the Cybersecurity and Business Continuity Training Programs
Required Experience

Previous experience in a similar role preferable.

Required Qualifications, Skills and Knowledge
  • Bachelor’s in computer science, Information Technology or related field;
  • Background in assuring high level of Information Security management and Business Continuity management in an organization;
  • IT/Info/Cyber Security risk management knowledge, including application risk classification and application control assessments;
  • Knowledge of financial industry products and related IT platform, a plus.
About us

We are the leading banking group in Italy and one of the Top Tier in Europe. Join us and be part of our successful story!

With over 20 million customers in Italy and abroad, we are a true engine of sustainable growth, with a strong commitment to the environment and a tangible impact on society. People are our driving force. We take care of them and foster an inclusive culture where everyone feels valued and empowered.

Join an international and innovative Group. Don't wait for the future, choose it!

#sharingfuture

We guarantee an inclusive and equal environment. We will consider all applicants regardless of race, religion, sexual orientation, gender identity, marital status, national origin, age, disability, or any other protected category in compliance to D.lgs. 198/2006, 215/03 and 216/03.

For the evaluation of the application, the data will be processed by Intesa Sanpaolo S.p.A. as Data Controller. We invite you to review the dedicated Privacy Information Notice for more details.

#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cyber threats Jobs in United Arab Emirates !

Security Analyst

New
Dubai, Dubai Help AG

Posted today

Job Viewed

Tap Again To Close

Job Description

Help AG is looking for a talented and enthusiastic Security Analyst who will have a strong knowledge and interest in network security. The Security Analyst will be responsible for monitoring multiple security technologies and events using the Security Information Event Management (SIEM) tool in order to detect and identify IT security related incidents.

This role requires:

  • 2-4 years of experience in information security, in areas such as security operations, intrusion detection, incident analysis, incident handling, log analysis, or firewall administration.
  • 2-4 years of experience in one of the following: Network operations or engineering or system administration on Unix, Linux, Windows.

Responsibilities

  • Follow detailed operational processes and procedures to appropriately analyze, escalate, and assist in the remediation of critical information security incidents.
  • Correlate and analyze events using the Splunk/Log Rhythm/Qradar SIEM tool to detect IT security incidents.
  • Conduct analysis of log files, including forensic analysis of system resource access.
  • Review customer reports to ensure quality and accuracy.
  • Monitor multiple security technologies, such as SIEM, IDS/IPS, Firewalls, Switches, VPNs, and other security threat data sources.
  • Respond to inbound requests via phone and other electronic means for technical assistance with managed services.
  • Respond in a timely manner (within documented SLA) to support, threat, and other cases.
  • Document actions in cases to effectively communicate information internally and to customers.
  • Resolve problems independently and understand escalation procedures.
  • Maintain a high degree of awareness of the current threat landscape.
  • Participate in knowledge sharing with other analysts and writing technical articles for Internal Knowledge Bases.
  • Perform other essential duties as assigned.
  • Able to work in rotating shifts within a 24/7 operating environment.

Qualifications & Skills

  • A Degree in Computer Science, Information Systems, Electrical Engineering, or a closely related degree.
  • An active interest in internet security, incident detection, network and systems security.
  • A sound knowledge of IT security best practices, common attack types and detection/prevention methods.
  • Demonstrable experience of analyzing and interpreting system, security, and application logs.
  • Knowledge of the type of events that both Firewalls, IDS/IPS, and other security-related devices produce.
  • Experience in using SIEM tools such as Splunk, Log Rhythm, Qradar, Alien Vault, NitroSecurity, etc.
  • TCP/IP knowledge, networking, and security product experience.
  • Knowledge of Cyber Kill Chain and MITRE ATT&CK frameworks.
  • Possible attack activities, such as scans, man in the middle, sniffing, DoS, DDoS, etc., and possible abnormal activities, such as worms, Trojans, viruses, etc.
  • CCNA, CISSP, GCA, GCIA, GCIH, CEH certification would be preferable.
  • Outstanding organizational skills.
  • Exclusive focus and vast experience in IT.
  • Strong analytical and problem-solving skills.
  • A motivated, self-managed individual who can demonstrate above-average analytical skills and work professionally with peers and customers even under pressure.
  • Very good communication skills.
  • Strong written and verbal skills.
  • Strong interpersonal skills with the ability to collaborate well with others.
  • Ability to speak and write in English is required; Arabic is preferred.

Benefits

  • Health insurance with one of the leading global providers for medical insurance.
  • Career progression and growth through challenging projects and work.
  • Employee engagement and wellness campaigns activities throughout the year.
  • Excellent learning and development opportunities.
  • Inclusive and diverse working environment.
  • Flexible/Hybrid working environment.
  • Annual flight tickets to home country.
  • Open door policy.

About Us

Help AG is the cybersecurity arm of e& enterprise (formerly Etisalat Digital) and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.

Present in the Middle East since 2004, Help AG was strategically acquired by e& (formerly Etisalat Group) in 2020, hence creating a cybersecurity and digital transformation powerhouse in the region.

Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and maintaining its focus on all aspects of cybersecurity. With best of breed technologies from industry-leading vendor partners, expertly qualified service delivery teams, and a state-of-the-art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Group-IT Security Analyst

New
Dubai, Dubai Gulf Agency Company

Posted today

Job Viewed

Tap Again To Close

Job Description

At GAC Group IT, our dedication to providing top‑notch solutions to 6000+ users worldwide relies on the dependability of our IT systems, all while upholding our ISO 27001 certification. As we grow the GAC Group IT Team, we are actively seeking an IT Security Analyst to bring his/her technological proficiency to enhance our security protocols.

The Group IT team is dedicated to constructing, configuring, maintaining, and enhancing applications throughout their life cycle while safeguarding them against cyber threats.

Key Responsibilities
  • Implement and maintain security solutions for our network, infrastructure and applications hosted in On‑prem Data Center and Azure Cloud.
  • Closely work with Software development & DevSecOps teams to resolve issues.
  • Guide GAC branch offices to improve their IT security posture.
  • Monitor and respond to security incidents and perform root cause analysis.
  • Research and stay updated on the latest security trends and best practices.
Job Requirements
  • A bachelor’s degree in computer science / information security.
  • A minimum of 2 years of experience as an IT Security Analyst or a similar role.
  • A proficiency in implementing & managing security tools such as CSPM, VAPT, VMDR, EDR.
  • Excellent teamwork, problem‑solving, analytical and communication skills.
  • Holding relevant certifications such as Azure Security (AZ‑500), CCSP, etc. will be advantageous.
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

IAM Security Analyst (UAE National)

New
Dubai, Dubai AL Rostamani Group LLC.

Posted today

Job Viewed

Tap Again To Close

Job Description

Company: Al Rostamani Group of Companies LLC

Every employee at Al Rostamani Group plays a role in making a real difference to the business and our customers. We care for our employees by offering them meaningful and purposeful work and an opportunity to grow, learn, contribute and succeed. Today, the Al Rostamani Group has come a long way since its birth in 1957. Our group has grown steadfastly with the guiding principles of Commitment, Care & Vision, alongside a strong sense of active involvement in the community. We are a well-diversified group, with a key presence in industries such as General Trading, Automobiles and Heavy Equipment, Travel, Foreign Exchange, Financial Services, Property Management, Construction, Infrastructure Development and Information Technology Services. Our Group employs approximately 2000 people from 41 different nationalities, which contributes to our multicultural and multi-national environment.

The Identity & Access Management (IAM) Security Analyst is responsible for protecting the organisation’s digital assets by managing identities, access controls, and authentication systems. This role ensures that only authorised users can access sensitive data, enforce the principle of least privilege, and support compliance with security policies and regulations. Working closely with IT Security & Governance, Group Information Technology, and other departments, the Analyst helps implement security measures, monitor for threats, and respond to incidents.
Beyond daily operations, the Analyst develops security protocols, works closely with business units to conduct access reviews and security assessments, and recommends improvements to strengthen the organisation’s cybersecurity posture. The role also involves cross‑functional collaboration, providing actionable insights to senior leadership, and promoting a culture of security awareness across the enterprise.

Job Responsibilities

Technical Responsibilities

  • Access Management and Review: Lead and manage the IAM lifecycle, including provisioning, modification, deprovisioning, and access reviews across all systems and applications.
  • Security Monitoring and Incident Response: Monitor IAM and SIEM logs and alerts to identify and respond to suspicious activity, unauthorised access, and security incidents.
  • Technical Due Diligence: Evaluate new applications for IAM compatibility, focusing on authentication, access controls, scalability, and security compliance.
  • Vulnerability Assessment and Penetration Testing: Conduct comprehensive VA/PT across IT infrastructure, including servers, web applications, APIs, and mobile applications.
  • Security Configuration Management: Oversee and optimise IAM solutions across cloud platforms, ensuring seamless system integrations and secure access through technical controls such as firewalls, WAF, NAC, and PAM.
  • Security Technology Research: Actively research, evaluate, and drive next‑generation security technologies and solutions to meet organisational requirements.

Business Responsibilities

  • Audit Coordination and Remediation: Support the coordination of internal and external audits, track security audit findings, and report remediation efforts.
  • Policy and Governance: Enforce and support the development of IAM policies, procedures, and best practices, and remediate violations in coordination with IT Operations and Application teams.
  • Security Training and Awareness: Assist in developing and delivering security training programs and awareness campaigns for employees.
  • Compliance Monitoring: Monitor adherence to IT and security governance frameworks and recommend improvements.
  • Vendor Liaison: Liaise with vendors for POCs and demos of new IT security requirements.
Job Requirements

Qualifications

  • Bachelor's degree or higher in a relevant field.
  • Security certifications such as Certified Ethical Hacker (CEH) or CompTIA Security+ are preferred.

Experience

  • Proven experience (typically 3+ years) in information security.

Knowledge and Skills

  • Strong knowledge of cloud security, cybersecurity frameworks, standards, and best practices.
  • Strong understanding of IT governance frameworks, regulatory requirements, and industry standards.
  • Excellent communication and interpersonal skills.
  • Demonstrated ability to influence and collaborate with cross‑functional teams.
  • In‑depth understanding of risk management, compliance, and governance principles.

Experience in managing data protection mechanisms, preferably on cloud platforms like Microsoft Purview.

  • Knowledge of the Microsoft Defender Suite and the Identity and Access Management suite.
  • Understanding security solutions such as NAC, PAM, EDR, DLP, SIEM, SOAR, and NDR.
  • Knowledge of security configurations in cloud platforms, e.g., AWS, Azure, and Microsoft 365.

At Al Rostamani Group, we seek talented people who work hard to achieve great things. We consider not only your skills and experience, but also your passion for the role, your desire to learn and how well you align with our core values of care, commitment and vision. If this position represents an opportunity you wish to pursue, we invite you to apply.

#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cyber Threats Jobs