58 Security Monitoring jobs in the United Arab Emirates

Hotel Security Monitoring Professional

Dubai, Dubai beBeeSafety

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Overview:

We are seeking a highly skilled and detail-oriented Security Monitoring Specialist to join our team. This is a challenging role that requires the ability to stay alert and active during long shifts, respond quickly to emergencies, and make quick decisions in high-pressure situations.

About the Role:
  • Monitor security camera feeds, alarm systems, and other surveillance equipment to detect suspicious activity or security breaches throughout the hotel.
  • Respond to security incidents promptly, including disturbances, trespassing, theft, or emergencies. Coordinate with on-site security associates and external authorities when necessary.
  • Act as a communication hub for security personnel management and emergency services, ensuring timely and accurate transmission of information during security incidents or emergencies.
  • Monitor and control access to restricted areas of the hotel, including staff-only areas, through keycard systems, biometric systems, or manual logging of authorized personnel.
  • Be prepared to take immediate action during emergency situations, including evacuations, fire alarms, medical emergencies, or natural disasters. Ensure emergency procedures are followed and the situation is managed effectively.
  • Oversee the functioning of alarm systems and respond to triggered alarms (e.g., fire alarms, intrusion alarms, panic buttons). Ensure security systems are functioning properly and troubleshoot any malfunctions.
  • Maintain accurate logs of all incidents, security breaches, system malfunctions, and any actions taken. Prepare daily reports summarizing security activity and incidents for review by management.
  • Provide assistance in ensuring guest and associate safety by reporting any unusual activity or potential threats. Offer guidance and instructions to guests or associates during emergencies.
  • Ensure the hotel adheres to all security and safety regulations, including local laws, industry standards, and hotel-specific protocols.
  • Assist in training new security control room operators and other hotel associates on security procedures, emergency protocols, and the use of security equipment.
Requirements:
  • Previous experience in security or control room operations is preferred.
  • Proficiency in operating CCTV and other security systems is required.
  • Strong verbal and written communication skills with the ability to coordinate effectively with team members and external agencies.
  • Ability to stay alert and active during long shifts and respond quickly to emergencies.
  • Strong attention to detail and ability to notice discrepancies in surveillance footage or reports.
  • Ability to make quick decisions and stay calm in high-pressure situations.
This advertiser has chosen not to accept applicants from your region.

Incident Response Engineer

Dubai, Dubai P2P

Posted today

Job Viewed

Tap Again To Close

Job Description

As a member of the ETMSA team at Crypto.com , you will be integral to responding to and managing cybersecurity threats and incidents throughout their lifecycle – from Preparation to Identification, Containment, Eradication, Recovery, and Lessons Learned – collaborating with a global team of incident responders.

You will apply your comprehensive skills in cyber defense, digital forensics, log analysis, and intrusion analysis to address security incidents across our endpoints, network, and cloud infrastructure. In this role, you will be responsible for prevention, detection, response, and remediation activities, ensuring that information assets and technologies are adequately protected by leveraging various technologies such as Next-Generation Firewalls (NGFW), Endpoint Detection and Response (EDR), Intrusion Detection/Prevention Systems (IDS/IPS), Data Loss Prevention (DLP), and more.

You will also leverage your collaboration and communication skills to work effectively with all relevant stakeholders in multicultural and global environments.

Responsibilities

- Report to Director to facilitate all phases in the incident response lifecycle

- Be involved in various incident prevention projects to improve Security posture

Preparation:

- Understand different regulatory and compliance requirements like critical time to report, escalation flows, etc.

- Take part in self-assessment exercises like Tabletop Exercises, Attack Simulations, Red/Purple Team exercises to make sure the incident response process is working smoothly

Develop incident response runbooks, playbooks and SOPs with reference to different regulatory requirements

- Evaluate the incident response readiness of different layers - people, process, technology

Detection & Analysis:

- Respond to the cyber security incidents escalated from various channels including the 24/7 SOC team.

- Respond to cyber security incidents in compliance with the local authority / regulatory requirements.

- Assess the risk, impact and scope of the identified security threats

- Perform deep-dive incident analysis of various data sources by analysing and investigating security related logs against medium-term threats and IOCs

Containment, Eradication and Recovery:

- Communicate with the stakeholders and provide guidance, recommendations to contain and eradicate the security incident

- Participate in root cause analysis using forensic and other custom tools to identify any sources of compromise and/or malicious activities taking place.

- Document and present investigative findings for high profile events and other incidents of interest.

Post incident activities:

- Provide lessons learnt meeting to the stakeholders

- Lead and keep track on the follow-up activities

- Document the incident in the case management system and provide incident reports

Always ready to jump in, in the event of security incidents.

Requirements
  • At least 5 years experience in the Cyber Security industry
  • Strong technical and analytical skills
  • Familiar with the cyber security incident response process
  • Familiarity with AI tools and their application in automating security tasks and processes.
  • Hands-on experience on performing incident response activities
  • Have scripting experience like Bash, PowerShell, Python, Go, etc, and the ability to use these skills to aid in responding to incidents involving Windows, Linux, macOS, as well as cloud environment
  • Have knowledge of cybersecurity tools and software like NGFW, EDR, IDS/IPS, EDR, DLP, SIEM, other log management platforms, etc.
  • Be familiar with the MITRE ATT&CK Framework and/or Cyber Kill Chain
  • Be passionate on exploring new technologies and having creative initiative to boost the team capabilities
  • Holders of security related certifications is a plus ( e.g.Azure , AWS, CISSP, GCIH, GCIA, GCFA, GNFA, GREM, or other equivalent)
  • Awareness of regulatory and compliance requirements like GDPR, MAS, PSD2 etc is a plus.
Preferably
  • Fast learner with can do attitude and ready to get the hands dirty
  • A strong team player who can collaborate with compassion
  • Passionate to learn and willing to put in the extra effort
  • Understand the concept of ownership and accountability coupled with sense of urgency and prioritisation
  • Confidence in handling incidents and managing relevant senior and technical stakeholders
  • Possess business acumen/mindset (not only technical) when making critical decisions
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Incident Response Engineer

Dubai, Dubai Crypto.com

Posted today

Job Viewed

Tap Again To Close

Job Description

As a member of the ETMSA team at Crypto.com , you will be integral to responding to and managing cybersecurity threats and incidents throughout their lifecycle – from Preparation to Identification, Containment, Eradication, Recovery, and Lessons Learned – collaborating with a global team of incident responders.

You will apply your comprehensive skills in cyber defense, digital forensics, log analysis, and intrusion analysis to address security incidents across our endpoints, network, and cloud infrastructure. In this role, you will be responsible for prevention, detection, response, and remediation activities, ensuring that information assets and technologies are adequately protected by leveraging various technologies such as Next-Generation Firewalls (NGFW), Endpoint Detection and Response (EDR), Intrusion Detection/Prevention Systems (IDS/IPS), Data Loss Prevention (DLP), and more.

You will also leverage your collaboration and communication skills to work effectively with all relevant stakeholders in multicultural and global environments.

Responsibilities
  • Report to Director to facilitate all phases in the incident response lifecycle
  • Be involved in various incident prevention projects to improve Security posture
  • Preparation:
    • Understand different regulatory and compliance requirements like critical time to report, escalation flows, etc.
    • Take part in self-assessment exercises like Tabletop Exercises, Attack Simulations, Red/Purple Team exercises to make sure the incident response process is working smoothly
    • Develop incident response runbooks, playbooks and SOPs with reference to different regulatory requirements
    • Evaluate the incident response readiness of different layers - people, process, technology
  • Detection & Analysis:
    • Respond to the cyber security incidents escalated from various channels including the 24/7 SOC team.
    • Respond to cyber security incidents in compliance with the local authority / regulatory requirements.
    • Assess the risk, impact and scope of the identified security threats
    • Perform deep-dive incident analysis of various data sources by analysing and investigating security related logs against medium-term threats and IOCs
  • Containment, Eradication and Recovery:
    • Communicate with the stakeholders and provide guidance, recommendations to contain and eradicate the security incident
    • Participate in root cause analysis using forensic and other custom tools to identify any sources of compromise and/or malicious activities taking place.
    • Document and present investigative findings for high profile events and other incidents of interest.
  • Post incident activities:
    • Provide lessons learnt meeting to the stakeholders
    • Lead and keep track on the follow-up activities
    • Document the incident in the case management system and provide incident reports
  • Always ready to jump in, in the event of security incidents.
Requirements
  • At least 5 years experience in the Cyber Security industry
  • Strong technical and analytical skills
  • Familiar with the cyber security incident response process
  • Familiarity with AI tools and their application in automating security tasks and processes
  • Hands-on experience on performing incident response activities
  • Have scripting experience like Bash, PowerShell, Python, Go, etc, and the ability to use these skills to aid in responding to incidents involving Windows, Linux, macOS, as well as cloud environment
  • Have knowledge of cybersecurity tools and software like NGFW, EDR, IDS/IPS, EDR, DLP, SIEM, other log management platforms, etc
  • Be familiar with the MITRE ATT&CK Framework and/or Cyber Kill Chain
  • Be passionate on exploring new technologies and having creative initiative to boost the team capabilities
  • Holders of security related certifications is a plus (e.g.Azure, AWS, CISSP, GCIH, GCIA, GCFA, GNFA, GREM, or other equivalent)
  • Awareness of regulatory and compliance requirements like GDPR, MAS, PSD2 etc is a plus
Preferably
  • Fast learner with can do attitude and ready to get the hands dirty
  • A strong team player who can collaborate with compassion
  • Passionate to learn and willing to put in the extra effort
  • Understand the concept of ownership and accountability coupled with sense of urgency and prioritisation
  • Confidence in handling incidents and managing relevant senior and technical stakeholders
  • Possess business acumen/mindset (not only technical) when making critical decisions
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Incident Response Consultant

Dubai, Dubai beBeeCybersecurity

Posted today

Job Viewed

Tap Again To Close

Job Description

Incident Response Consultant

We are seeking an experienced Incident Response Consultant to join our team. In this role, you will work closely with our security team to investigate and respond to cyber threats.

  • Investigate and analyze security incidents to identify the root cause and recommend remediation strategies;
  • Develop and implement incident response plans to ensure timely and effective responses to security incidents;
  • Collaborate with internal teams to provide guidance and support on security-related matters;

Required Skills:

  • 6+ years of experience in network security and digital forensics;
  • Expert knowledge of DFIR tools such as Access Data, IDA Pro, FTK+, Encase;
  • Familiarity with threat hunting tools and commercial and open-source solutions;

Benefits:

  • Opportunity to work with a dynamic and growing organization;
  • Competitive salary and benefits package;
  • Opportunities for professional growth and development;

Others:

  • GCIA, GCIH, or CISSP certifications;
  • SANS Certified Forensic Examiner (GCFE) certification;
  • Industry Certification on Digital Forensics Tools.
This advertiser has chosen not to accept applicants from your region.

Incident Response Engineer

Dubai, Dubai P2P

Posted today

Job Viewed

Tap Again To Close

Job Description

As a member of the ETMSA team at , you will be integral to responding to and managing cybersecurity threats and incidents throughout their lifecycle – from Preparation to Identification, Containment, Eradication, Recovery, and Lessons Learned – collaborating with a global team of incident responders. You will apply your comprehensive skills in cyber defense, digital forensics, log analysis, and intrusion analysis to address security incidents across our endpoints, network, and cloud infrastructure. In this role, you will be responsible for prevention, detection, response, and remediation activities, ensuring that information assets and technologies are adequately protected by leveraging various technologies such as Next-Generation Firewalls (NGFW), Endpoint Detection and Response (EDR), Intrusion Detection/Prevention Systems (IDS/IPS), Data Loss Prevention (DLP), and more. You will also leverage your collaboration and communication skills to work effectively with all relevant stakeholders in multicultural and global environments. Responsibilities - Report to Director to facilitate all phases in the incident response lifecycle - Be involved in various incident prevention projects to improve Security posture Preparation: - Understand different regulatory and compliance requirements like critical time to report, escalation flows, etc. - Take part in self-assessment exercises like Tabletop Exercises, Attack Simulations, Red/Purple Team exercises to make sure the incident response process is working smoothly Develop incident response runbooks, playbooks and SOPs with reference to different regulatory requirements - Evaluate the incident response readiness of different layers - people, process, technology Detection & Analysis: - Respond to the cyber security incidents escalated from various channels including the 24/7 SOC team. - Respond to cyber security incidents in compliance with the local authority / regulatory requirements. - Assess the risk, impact and scope of the identified security threats - Perform deep-dive incident analysis of various data sources by analysing and investigating security related logs against medium-term threats and IOCs Containment, Eradication and Recovery: - Communicate with the stakeholders and provide guidance, recommendations to contain and eradicate the security incident - Participate in root cause analysis using forensic and other custom tools to identify any sources of compromise and/or malicious activities taking place. - Document and present investigative findings for high profile events and other incidents of interest. Post incident activities: - Provide lessons learnt meeting to the stakeholders - Lead and keep track on the follow-up activities - Document the incident in the case management system and provide incident reports Always ready to jump in, in the event of security incidents. Requirements
  • At least 5 years experience in the Cyber Security industry
  • Strong technical and analytical skills
  • Familiar with the cyber security incident response process
  • Familiarity with AI tools and their application in automating security tasks and processes.
  • Hands-on experience on performing incident response activities
  • Have scripting experience like Bash, PowerShell, Python, Go, etc, and the ability to use these skills to aid in responding to incidents involving Windows, Linux, macOS, as well as cloud environment
  • Have knowledge of cybersecurity tools and software like NGFW, EDR, IDS/IPS, EDR, DLP, SIEM, other log management platforms, etc.
  • Be familiar with the MITRE ATT&CK Framework and/or Cyber Kill Chain
  • Be passionate on exploring new technologies and having creative initiative to boost the team capabilities
  • Holders of security related certifications is a plus (e.g.Azure, AWS, CISSP, GCIH, GCIA, GCFA, GNFA, GREM, or other equivalent)
  • Awareness of regulatory and compliance requirements like GDPR, MAS, PSD2 etc is a plus.
Preferably
  • Fast learner with can do attitude and ready to get the hands dirty
  • A strong team player who can collaborate with compassion
  • Passionate to learn and willing to put in the extra effort
  • Understand the concept of ownership and accountability coupled with sense of urgency and prioritisation
  • Confidence in handling incidents and managing relevant senior and technical stakeholders
  • Possess business acumen/mindset (not only technical) when making critical decisions

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Incident Response Manager

Abu Dhabi, Abu Dhabi ADIB Group

Posted today

Job Viewed

Tap Again To Close

Job Description


Role: Incident Response Manager

Location: Abu Dhabi

Role purpose:

  • The Incident Response Manager will lead the Cyber Security Incident Response unit oversee its day-to-day operations and manage the SOC shifts.
  • This role requires collaboration with various internal teams and departments as well as external partners and cybersecurity agencies to ensure an effective and timely response to all security incidents.
  • The manager must demonstrate strong leadership skills encourage teamwork optimize team performance and develop incident response strategies.
  • Additionally this position demands hands-on expertise in handling complex L3 security incidents from detection to disposition including leveraging AI-driven threat detection and automated incident response tools.
  • The role also requires strong crisis management and stakeholder communication skills to effectively coordinate during high-impact security events.

Key accountabilities of the role:

Leadership and strategy:

  • Lead the Cyber Security Incident Response unit managing both the day-to-day operations and the strategic development of incident response capabilities.
  • Develop oversee and refine incident response plans playbooks and strategies to ensure rapid and effective response to security breaches.
  • Maintain and enhance information security monitoring processes tools and technologies driving continuous improvements and reducing gaps between current and ideal states.
  • Demonstrate adaptability and innovation to address evolving threat landscapes continuously enhancing the response approach.
  • Incident Management:
  • Directly handle L3 security incidents overseeing their detection analysis containment and resolution.
  • Supervise the staffs utilization of security monitoring tools and ensure high levels of team performance and engagement.
  • Coordinate with threat intelligence monitoring teams and other security functions to effectively communicate incident findings to leadership and relevant stakeholders.
  • Implement and maintain robust incident response frameworks including industry standards such as NIST MITRE ATT&CK and best practices for coordinated response efforts.
  • Prepare and present post-incident reports including lessons learned and recommendations for preventive measures to executive management.
  • Experience in crisis management and business continuity planning.

Operational efficiency:

  • Manage SOC shift schedules to ensure 24/7 coverage and effective resource utilization.
  • Provide detailed reports on incident investigations root cause analyses and mitigation strategies contributing to the organizations continuous improvement efforts.
  • Develop and track key performance metrics for incident management and response reporting outcomes to senior management.
  • Maintain strong relationships with internal and external stakeholders to support the incident problem and change management cycles.
  • Facilitate effective communication during incidents ensuring that stakeholders are informed of progress and resolution steps.

Specialist skills / technical knowledge required for this role:

  • Proven experience in managing security operations centers and incident response teams.
  • Demonstrated capability in hands-on management of L3 security incidents from detection through to disposition.
  • Strong leadership skills with the ability to motivate and guide teams.
  • Expertise in information security principles the cyber threat landscape and incident response protocols.
  • Excellent communication and interpersonal skills to interact with various business units and IT departments.
  • Knowledge of ISO 27001 NESA PCI DSS SWIFT and other information security standards and regulations.
  • Familiarity with incident response frameworks (NIST MITRE ATT&CK) and best practices in managing cybersecurity incidents.
  • Ability to manage multiple tasks with high attention to detail and organizational skills.
  • Bachelors degree in engineering IT or a related technical discipline.
  • Relevant certifications in cybersecurity and incident management (e.g. CISSP CISM GCFA GCIH).

Previous Experience:

  • More than 10 years of experience in information security particularly in incident management and response within banks or financial institutions.
  • Strong experience in monitoring and incident handling techniques and tools.
  • Experience managing a Computer Incident Response Team (CIRT) Computer Security Incident Response Center (CSIRC) or Security Operations Center (SOC).
  • Executive experience including management-level discussions.

Required Experience:

Manager

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Incident Response Engineer

Dubai, Dubai P2P

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

As a member of the ETMSA team at Crypto.com, you will be integral to responding to and managing cybersecurity threats and incidents throughout their lifecycle – from Preparation to Identification, Containment, Eradication, Recovery, and Lessons Learned – collaborating with a global team of incident responders.You will apply your comprehensive skills in cyber defense, digital forensics, log analysis, and intrusion analysis to address security incidents across our endpoints, network, and cloud infrastructure. In this role, you will be responsible for prevention, detection, response, and remediation activities, ensuring that information assets and technologies are adequately protected by leveraging various technologies such as Next-Generation Firewalls (NGFW), Endpoint Detection and Response (EDR), Intrusion Detection/Prevention Systems (IDS/IPS), Data Loss Prevention (DLP), and more.You will also leverage your collaboration and communication skills to work effectively with all relevant stakeholders in multicultural and global environments.Responsibilities- Report to Director to facilitate all phases in the incident response lifecycle- Be involved in various incident prevention projects to improve Security posturePreparation:- Understand different regulatory and compliance requirements like critical time to report, escalation flows, etc.- Take part in self-assessment exercises like Tabletop Exercises, Attack Simulations, Red/Purple Team exercises to make sure the incident response process is working smoothlyDevelop incident response runbooks, playbooks and SOPs with reference to different regulatory requirements- Evaluate the incident response readiness of different layers - people, process, technologyDetection & Analysis:- Respond to the cyber security incidents escalated from various channels including the 24/7 SOC team.- Respond to cyber security incidents in compliance with the local authority / regulatory requirements.- Assess the risk, impact and scope of the identified security threats- Perform deep-dive incident analysis of various data sources by analysing and investigating security related logs against medium-term threats and IOCsContainment, Eradication and Recovery:- Communicate with the stakeholders and provide guidance, recommendations to contain and eradicate the security incident- Participate in root cause analysis using forensic and other custom tools to identify any sources of compromise and/or malicious activities taking place.- Document and present investigative findings for high profile events and other incidents of interest.Post incident activities:- Provide lessons learnt meeting to the stakeholders- Lead and keep track on the follow-up activities- Document the incident in the case management system and provide incident reportsAlways ready to jump in, in the event of security incidents.Requirements
  • At least 5 years experience in the Cyber Security industry
  • Strong technical and analytical skills
  • Familiar with the cyber security incident response process
  • Familiarity with AI tools and their application in automating security tasks and processes.
  • Hands-on experience on performing incident response activities
  • Have scripting experience like Bash, PowerShell, Python, Go, etc, and the ability to use these skills to aid in responding to incidents involving Windows, Linux, macOS, as well as cloud environment
  • Have knowledge of cybersecurity tools and software like NGFW, EDR, IDS/IPS, EDR, DLP, SIEM, other log management platforms, etc.
  • Be familiar with the MITRE ATT&CK Framework and/or Cyber Kill Chain
  • Be passionate on exploring new technologies and having creative initiative to boost the team capabilities
  • Holders of security related certifications is a plus (e.g.Azure, AWS, CISSP, GCIH, GCIA, GCFA, GNFA, GREM, or other equivalent)
  • Awareness of regulatory and compliance requirements like GDPR, MAS, PSD2 etc is a plus.
Preferably
  • Fast learner with can do attitude and ready to get the hands dirty
  • A strong team player who can collaborate with compassion
  • Passionate to learn and willing to put in the extra effort
  • Understand the concept of ownership and accountability coupled with sense of urgency and prioritisation
  • Confidence in handling incidents and managing relevant senior and technical stakeholders
  • Possess business acumen/mindset (not only technical) when making critical decisions

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security monitoring Jobs in United Arab Emirates !

Incident Response Engineer

Dubai, Dubai Crypto.com

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

As a member of the ETMSA team at Crypto.com, you will be integral to responding to and managing cybersecurity threats and incidents throughout their lifecycle – from Preparation to Identification, Containment, Eradication, Recovery, and Lessons Learned – collaborating with a global team of incident responders.

You will apply your comprehensive skills in cyber defense, digital forensics, log analysis, and intrusion analysis to address security incidents across our endpoints, network, and cloud infrastructure. In this role, you will be responsible for prevention, detection, response, and remediation activities, ensuring that information assets and technologies are adequately protected by leveraging various technologies such as Next-Generation Firewalls (NGFW), Endpoint Detection and Response (EDR), Intrusion Detection/Prevention Systems (IDS/IPS), Data Loss Prevention (DLP), and more.

You will also leverage your collaboration and communication skills to work effectively with all relevant stakeholders in multicultural and global environments.

Responsibilities
  • Report to Director to facilitate all phases in the incident response lifecycle
  • Be involved in various incident prevention projects to improve Security posture
  • Preparation:
    • Understand different regulatory and compliance requirements like critical time to report, escalation flows, etc.
    • Take part in self-assessment exercises like Tabletop Exercises, Attack Simulations, Red/Purple Team exercises to make sure the incident response process is working smoothly
    • Develop incident response runbooks, playbooks and SOPs with reference to different regulatory requirements
    • Evaluate the incident response readiness of different layers - people, process, technology
  • Detection & Analysis:
    • Respond to the cyber security incidents escalated from various channels including the 24/7 SOC team.
    • Respond to cyber security incidents in compliance with the local authority / regulatory requirements.
    • Assess the risk, impact and scope of the identified security threats
    • Perform deep-dive incident analysis of various data sources by analysing and investigating security related logs against medium-term threats and IOCs
  • Containment, Eradication and Recovery:
    • Communicate with the stakeholders and provide guidance, recommendations to contain and eradicate the security incident
    • Participate in root cause analysis using forensic and other custom tools to identify any sources of compromise and/or malicious activities taking place.
    • Document and present investigative findings for high profile events and other incidents of interest.
  • Post incident activities:
    • Provide lessons learnt meeting to the stakeholders
    • Lead and keep track on the follow-up activities
    • Document the incident in the case management system and provide incident reports
  • Always ready to jump in, in the event of security incidents.
Requirements
  • At least 5 years experience in the Cyber Security industry
  • Strong technical and analytical skills
  • Familiar with the cyber security incident response process
  • Familiarity with AI tools and their application in automating security tasks and processes
  • Hands-on experience on performing incident response activities
  • Have scripting experience like Bash, PowerShell, Python, Go, etc, and the ability to use these skills to aid in responding to incidents involving Windows, Linux, macOS, as well as cloud environment
  • Have knowledge of cybersecurity tools and software like NGFW, EDR, IDS/IPS, EDR, DLP, SIEM, other log management platforms, etc
  • Be familiar with the MITRE ATT&CK Framework and/or Cyber Kill Chain
  • Be passionate on exploring new technologies and having creative initiative to boost the team capabilities
  • Holders of security related certifications is a plus (e.g.Azure, AWS, CISSP, GCIH, GCIA, GCFA, GNFA, GREM, or other equivalent)
  • Awareness of regulatory and compliance requirements like GDPR, MAS, PSD2 etc is a plus
Preferably
  • Fast learner with can do attitude and ready to get the hands dirty
  • A strong team player who can collaborate with compassion
  • Passionate to learn and willing to put in the extra effort
  • Understand the concept of ownership and accountability coupled with sense of urgency and prioritisation
  • Confidence in handling incidents and managing relevant senior and technical stakeholders
  • Possess business acumen/mindset (not only technical) when making critical decisions

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Incident Response Manager

Abu Dhabi, Abu Dhabi ADIB Group

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Description

Role: Incident Response Manager

Location: Abu Dhabi

Role purpose:

  • The Incident Response Manager will lead the Cyber Security Incident Response unit oversee its day-to-day operations and manage the SOC shifts.
  • This role requires collaboration with various internal teams and departments as well as external partners and cybersecurity agencies to ensure an effective and timely response to all security incidents.
  • The manager must demonstrate strong leadership skills encourage teamwork optimize team performance and develop incident response strategies.
  • Additionally this position demands hands-on expertise in handling complex L3 security incidents from detection to disposition including leveraging AI-driven threat detection and automated incident response tools.
  • The role also requires strong crisis management and stakeholder communication skills to effectively coordinate during high-impact security events.

Key accountabilities of the role:

Leadership and strategy:

  • Lead the Cyber Security Incident Response unit managing both the day-to-day operations and the strategic development of incident response capabilities.
  • Develop oversee and refine incident response plans playbooks and strategies to ensure rapid and effective response to security breaches.
  • Maintain and enhance information security monitoring processes tools and technologies driving continuous improvements and reducing gaps between current and ideal states.
  • Demonstrate adaptability and innovation to address evolving threat landscapes continuously enhancing the response approach.
  • Incident Management:
  • Directly handle L3 security incidents overseeing their detection analysis containment and resolution.
  • Supervise the staffs utilization of security monitoring tools and ensure high levels of team performance and engagement.
  • Coordinate with threat intelligence monitoring teams and other security functions to effectively communicate incident findings to leadership and relevant stakeholders.
  • Implement and maintain robust incident response frameworks including industry standards such as NIST MITRE ATT&CK and best practices for coordinated response efforts.
  • Prepare and present post-incident reports including lessons learned and recommendations for preventive measures to executive management.
  • Experience in crisis management and business continuity planning.

Operational efficiency:

  • Manage SOC shift schedules to ensure 24/7 coverage and effective resource utilization.
  • Provide detailed reports on incident investigations root cause analyses and mitigation strategies contributing to the organizations continuous improvement efforts.
  • Develop and track key performance metrics for incident management and response reporting outcomes to senior management.
  • Maintain strong relationships with internal and external stakeholders to support the incident problem and change management cycles.
  • Facilitate effective communication during incidents ensuring that stakeholders are informed of progress and resolution steps.

Specialist skills / technical knowledge required for this role:

  • Proven experience in managing security operations centers and incident response teams.
  • Demonstrated capability in hands-on management of L3 security incidents from detection through to disposition.
  • Strong leadership skills with the ability to motivate and guide teams.
  • Expertise in information security principles the cyber threat landscape and incident response protocols.
  • Excellent communication and interpersonal skills to interact with various business units and IT departments.
  • Knowledge of ISO 27001 NESA PCI DSS SWIFT and other information security standards and regulations.
  • Familiarity with incident response frameworks (NIST MITRE ATT&CK) and best practices in managing cybersecurity incidents.
  • Ability to manage multiple tasks with high attention to detail and organizational skills.
  • Bachelors degree in engineering IT or a related technical discipline.
  • Relevant certifications in cybersecurity and incident management (e.g. CISSP CISM GCFA GCIH).

Previous Experience:

  • More than 10 years of experience in information security particularly in incident management and response within banks or financial institutions.
  • Strong experience in monitoring and incident handling techniques and tools.
  • Experience managing a Computer Incident Response Team (CIRT) Computer Security Incident Response Center (CSIRC) or Security Operations Center (SOC).
  • Executive experience including management-level discussions.

Required Experience:

Manager

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Incident Response Operations Manager

Abu Dhabi, Abu Dhabi beBeeIncident

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Title: Incident Response Manager

Location: Abu Dhabi, UAE

The Cyber Security Incident Response unit is led by the Incident Response Manager, overseeing its day-to-day operations and managing the SOC shifts. This role requires collaboration with various internal teams and departments as well as external partners and cybersecurity agencies to ensure an effective and timely response to all security incidents.

This position demands strong leadership skills, encouraging teamwork, optimizing team performance, and developing incident response strategies. The manager must also demonstrate hands-on expertise in handling complex L3 security incidents from detection to disposition, including leveraging AI-driven threat detection and automated incident response tools.

  • The manager will lead the development of incident response plans, playbooks, and strategies to ensure rapid and effective response to security breaches.
  • Maintain and enhance information security monitoring processes, tools, and technologies, driving continuous improvements and reducing gaps between current and ideal states.
  • Directly handle L3 security incidents, overseeing their detection, analysis, containment, and resolution.
Key Accountabilities: Leadership and Strategy:
  • Lead the development and refinement of incident response capabilities, ensuring adaptability and innovation to address evolving threat landscapes.
  • Develop, oversee, and refine incident response plans, playbooks, and strategies to ensure rapid and effective response to security breaches.
  • Supervise the staff's utilization of security monitoring tools and ensure high levels of team performance and engagement.
  • Demonstrate crisis management and stakeholder communication skills to effectively coordinate during high-impact security events.
Incident Management:
  • Implement and maintain robust incident response frameworks, including industry standards such as NIST, MITRE ATT&CK, and best practices for coordinated response efforts.
  • Prepare and present post-incident reports, including lessons learned and recommendations for preventive measures to executive management.
  • Manage SOC shift schedules to ensure 24/7 coverage and effective resource utilization.
  • Develop and track key performance metrics for incident management and response reporting outcomes to senior management.
Operational Efficiency:
  • Foster strong relationships with internal and external stakeholders to support the incident problem and change management cycles.
  • Facilitate effective communication during incidents, ensuring that stakeholders are informed of progress and resolution steps.
  • Provide detailed reports on incident investigations, root cause analyses, and mitigation strategies, contributing to the organization's continuous improvement efforts.
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Monitoring Jobs