176 Soc Analyst jobs in the United Arab Emirates
SOC Analyst
Job Viewed
Job Description
The ENTERTAINER is a leader in the Lifestyle industry, providing our members with exclusive access to 2-for-1 vouchers for dining, delivery, attractions, shopping, and travel across the GCC and Singapore. We are dedicated to pushing the boundaries of customer satisfaction and business growth, continuously innovating to enhance the way our users engage with entertainment. Join us as we strive to transform the entertainment landscape through creativity and innovation.
Position OverviewWe are seeking a highly skilled and proactive SOC Analyst to join our Security and Systems Monitoring Team. This role is critical in safeguarding both our cloud and on-premise infrastructure. The ideal candidate will be responsible for implementing, managing, and monitoring network security solutions in alignment with The Entertainer's best practice guidelines. You'll work closely with the SOC team, system administrators, and development teams to ensure continuous protection and effective incident response across our entire digital landscape.
- Monitor, configure, and maintain all network security and infrastructure monitoring systems.
- Collaborate with the SOC team to review and resolve security incidents and tickets.
- Work cross-functionally with Systems, Development, and HR to address escalations and ensure incident response plans are followed.
- Maintain and improve dashboards, alerts, and metrics for infrastructure and application monitoring.
- Install, configure, and maintain security and monitoring packages/software.
- Conduct regular security assessments for network, software deployments, and internal systems.
- Troubleshoot and resolve complex network issues to identify root causes and ensure optimal performance.
- Enhance network reliability, availability, and security by implementing preventive and corrective measures.
- Perform regular internal security reviews, penetration testing, and assessments on applications, servers, firewalls, and infrastructure.
- Implement data and network security protocols including firewalls, UTM, IPS/IDS, ACS, and VPN technologies.
- Provide technical guidance and mentoring on best practices in security and monitoring.
- Set up, manage, and monitor automated alerts and incident escalation protocols.
- Maintain detailed documentation for all security tools, incidents, and monitoring processes.
- Bachelor's degree in Computer Science or a related field (Master's preferred).
- Solid knowledge of Linux-based systems.
- Experience with Python and PHP-based web applications & APIs.
- Strong understanding of Amazon Web Services (AWS).
- Familiarity with Cloudflare, Firewalls, AWS CloudTrail, GuardDuty, and VPC Flow Logs.
- Hands-on experience with open-source security and penetration testing tools.
- Web servers: Apache, Gunicorn, Nginx
- Databases: MySQL, Percona, MongoDB
- DevOps tools: Git, Redis, Celery, Elasticsearch
- AWS services: S3, CloudFront, EC2, RDS, Aurora
- AWS Certified Security – Specialty certification is a strong plus.
#J-18808-Ljbffr
Job No Longer Available
This position is no longer listed on WhatJobs. The employer may be reviewing applications, filled the role, or has removed the listing.
However, we have similar jobs available for you below.
SOC Analyst
Posted today
Job Viewed
Job Description
We are seeking a highly skilled SOC Analyst (L1) to join our IT team in Dubai, UAE. You will be responsible for monitoring, detecting, analyzing, and responding to security events and incidents to protect our organization's information assets. Preference will be given to candidates with SOC Analyst experience and proficiency in SIEM platforms (Splunk, QRadar, ArcSight) or any other security monitoring tools.
Responsibilities:-
- Provide first-line technical support to end-users regarding network connectivity, security protocols, and related issues.
- Actively monitor and investigate security alerts to detect malicious activity at our clients during your shift in our 24x7x365.
- Follow documented procedures to properly triage and respond to identified activities, such as escalation or remediation actions.
- Communicate and collaborate with clients through the lifecycle of all escalated security investigations.
- Monitor, manage and maintain all network devices, performance, and quality across networks.
- Perform regular training to stay sharp on the latest technologies, methodologies, etc.
- Stay up to date on the latest vulnerabilities, threats, and attacks around the world.
- Document incidents from initial detection through final resolution or escalation
- Operate within direction to investigate and escalate incidents or alerts in accordance with protocols and contractual service level agreements (SLAs)
- Work a day and night shift rotational schedule.
- Monitor security events received through alerts from SIEM or other network and security monitoring tools.
- Maintain assigned ticket queue.
- Following Standard Operating Procedures (SOPs) for remediating various technology issues.
Qualifications:-
- 3-5 years of experience in an IT performance analysis or SOC Analyst role with a security focus.
- Bachelor's degree in information technology or related field or equivalent Security monitoring experience with one or more SIEM technologies
- A strong understanding of fundamental IT security concepts, including firewalls, intrusion detection/prevention systems, and access control.
- Experience with security incident and event management (SIEM) tools (e.g., Splunk, Sumo Logic, ELK Stack)
- Knowledge of common security frameworks and standards (e.g., NIST, ISO 27001, CIS Controls).
- Basic knowledge of client-server applications, multi-tier web applications, relational databases, firewalls, and enterprise Anti-Virus products
- Familiarity with IT service desk ticketing systems (e.g., ServiceNow, Jira Service Desk, Zendesk)
- Strong knowledge of IT including multiple operating systems and system administration skills (Windows, Apple, Linux)
- Proficiency in customer relationship management (CRM) and task management software
- Excellent communication skills, with the ability to convey technical information to non-technical users effectively.
What we offer:-
- A competitive salary and package.
- Working in a disruptive and fast-growing industry where the possibilities are endless
- A diverse team and inclusive culture.
- Outstanding teammates who want to celebrate your success
- The opportunity to join the next big global fintech.
Job Types: Full-time, Permanent
SOC Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities
- Continuously monitor security alerts from SIEM tools, EDR (e.g., CrowdStrike, SentinelOne), and other security tools to identify malicious activity.
- Investigate security events, alerts, and logs to determine the severity, scope, and impact of potential incidents.
- Execute our incident response plan to contain, eradicate, and recover from confirmed security incidents.
- Proactively search through networks and datasets to detect and isolate advanced threats that evade traditional security solutions.
- Create detailed incident reports and documentation for technical and executive audiences, ensuring lessons learned are applied.
- Provide feedback to improve and optimize SIEM rules, alerts, and use cases to reduce false positives and enhance detection capabilities.
- Work closely with other IT teams to implement corrective actions and improve the organization's overall security posture.
- Keep abreast of the latest cybersecurity threats, vulnerabilities, attack techniques, and threat intelligence sources.
Preferred Skills
- Security certifications (e.g., CISSP, CEH, GCIH, CompTIA Security+)
- Experience with cloud security (AWS, Azure, GCP)
- Experience with Security platform like Trend Micro, Crowd Strike, checkpoint, perception point, Microsoft Defender will be an added advantage.
Required Qualifications
- Bachelor's degree in Cybersecurity, Computer Science, or related field
- 2+ years of experience in a SOC or cybersecurity role
- Proficiency with SIEM platforms (e.g., Splunk, QRadar, Microsoft Sentinel)
- Strong understanding of network protocols, firewalls, IDS/IPS, and endpoint protection
- Familiarity with MITRE ATT&CK framework and threat intelligence platforms
- Strong analytical and problem-solving skills with a keen attention to detail.
- Strong communication and documentation abilities
Email : .AE
Job Type: Full-time
Pay: AED5, AED8,000.00 per month
SOC Analyst
Posted today
Job Viewed
Job Description
About Us
The ENTERTAINER is a leader in the Lifestyle industry, providing our members with exclusive access to 2-for-1 vouchers for dining, delivery, attractions, shopping, and travel across the GCC and Singapore. We are dedicated to pushing the boundaries of customer satisfaction and business growth, continuously innovating to enhance the way our users engage with entertainment. Join us as we strive to transform the entertainment landscape through creativity and innovation.
Position Overview
We are seeking a highly skilled and proactive SOC Analyst to join our Security and Systems Monitoring Team. This role is critical in safeguarding both our cloud and on-premise infrastructure. The ideal candidate will be responsible for implementing, managing, and monitoring network security solutions in alignment with The Entertainer's best practice guidelines. You'll work closely with the SOC team, system administrators, and development teams to ensure continuous protection and effective incident response across our entire digital landscape.
As a SOC Analyst you will
- Monitor, configure, and maintain all network security and infrastructure monitoring systems.
- Collaborate with the SOC team to review and resolve security incidents and tickets.
- Work cross-functionally with Systems, Development, and HR to address escalations and ensure incident response plans are followed.
- Maintain and improve dashboards, alerts, and metrics for infrastructure and application monitoring.
- Install, configure, and maintain security and monitoring packages/software.
- Conduct regular security assessments for network, software deployments, and internal systems.
- Troubleshoot and resolve complex network issues to identify root causes and ensure optimal performance.
- Enhance network reliability, availability, and security by implementing preventive and corrective measures.
- Perform regular internal security reviews, penetration testing, and assessments on applications, servers, firewalls, and infrastructure.
- Implement data and network security protocols including firewalls, UTM, IPS/IDS, ACS, and VPN technologies.
- Provide technical guidance and mentoring on best practices in security and monitoring.
- Set up, manage, and monitor automated alerts and incident escalation protocols.
- Maintain detailed documentation for all security tools, incidents, and monitoring processes.
What we're looking for
- Bachelor's degree in Computer Science or a related field (Master's preferred).
- Solid knowledge of Linux-based systems.
- Experience with Python and PHP-based web applications & APIs.
- Strong understanding of Amazon Web Services (AWS).
- Familiarity with Cloudflare, Firewalls, AWS CloudTrail, GuardDuty, and VPC Flow Logs.
- Hands-on experience with open-source security and penetration testing tools.
Working knowledge of:
- Web servers: Apache, Gunicorn, Nginx
- Databases: MySQL, Percona, MongoDB
- DevOps tools: Git, Redis, Celery, Elasticsearch
- AWS services: S3, CloudFront, EC2, RDS, Aurora
- AWS Certified Security – Specialty certification is a strong plus.
HrDBskdqIm
SOC Analyst
Posted today
Job Viewed
Job Description
Job Description
VAM Systems is currently looking for SOC Analyst for our UAE operations with the following skillsets & terms and conditions:
Minimum 5 years of experience in IT Security.
Proven experience in:
Administering and troubleshooting IS tools and applications.
Managing Windows servers, firewalls, and endpoint security.
Handling SOC alerts and incident response.
Conducting internal audits and compliance reviews.
1. Vulnerability Management
Detect, prioritize, and coordinate remediation of vulnerabilities. Generate and export weekly vulnerability reports. Highlight persistent issues with relevant teams for remediation.
Threat intelligence and prioritization.
- Information Security Systems
Administer and maintain IT security infrastructure. Perform troubleshooting, upgrade and ensure operational readiness.
- SOC Activities
Provide Level 2 SOC expertise, especially for incidents involving Microsoft allied solutions. Oversee SOC operations and incident response workflows. Apply ITIL and SANS-based methodologies for incident lifecycle management.
- Information Security Reviews
Conduct and oversee Infosec reviews as directed by the manager. Participate in ISR internal audits across IT systems, network, and enterprise solutions.
- Security Initiatives & Projects
Support ongoing IT security initiatives and projects. Collaborate on dashboards, scorecards, and automation of data refreshes for vulnerability and risk metrics.
Terms and conditions
Joining time frame: 15-30 Days
Soc Analyst
Posted today
Job Viewed
Job Description
Roles Responsibilitites
We are seeking a SOC Analyst with proven expertise in Microsoft Sentinel, Defender, Azure App, Zscaler and CrowdStrike to join and strengthen our customer security operations team. This role involves hands-on incident response, SIEM/EDR/Proxy optimization, and automation to improve detection and response efficiency. The candidate should have experience in financial services or other regulated industries and be passionate about building scalable, resilient SOC capabilities.
The candidate will be deployed onsite at the customer location will be part of the overall security operations of the customer.
Location:
Abu Dhabi, UAE
Mode of work:
On-site (Daily)
Qualification
- Bachelor's degree in Computer Science/Information Technology, or a related field.
- 5+ years in SOC operations, with 3+ years of hands-on experience in Microsoft Sentinel, Defender, Azure App and CrowdStrike.
- Proficiency in Python and PowerShell
Job Description
- Respond to and investigate malware, insider threats, and endpoint compromises, leveraging CrowdStrike Falcon for forensic analysis and remediation.
- Utilise Microsoft Sentinel for log correlation, threat detection, and dashboard development, integrating data sources such as Azure AD and Microsoft 365 Defender.
- Optimise and fine-tune KQL queries for threat hunting and detection use cases.
- Configure, deploy, and tune CrowdStrike Falcon policies, ensuring strong endpoint protection across enterprise assets.
- Use Falcon modules such as Insight, OverWatch, and Spotlight for vulnerability management, threat hunting, and adversary detection.
- Develop and maintain automation scripts (Python, PowerShell) to accelerate log parsing, enrichment, and incident remediation.
- Implement Sentinel Playbooks for automated incident escalation and workflow orchestration.
- Contribute to SOC modernisation initiatives, driving measurable improvements
- Collaborate with cross-functional teams and provide clear incident documentation for stakeholders.
Required Skills
Strong communication, presentation and collaboration skills.
Direct Customer handling experience (Onsite)
- Strong knowledge of incident response workflows and investigative techniques.
- Advanced KQL and Sentinel dashboarding capabilities.
- Proficiency in Python and PowerShell for automation.
- Hands-on experience with Falcon Insight, Overwatch, and Spotlight.
- Excellent problem-solving skills and ability to communicate findings to both technical and non-technical stakeholders.
SOC Analyst
Posted today
Job Viewed
Job Description
Job Description:
Delivery Skills required are: -
Technical Skills: -
*Identifying and analyzing potential threats and vulnerabilities using various tools and techniques.
*Leading and managing the response to security incidents, including containment, eradication, and recovery.
*Implementing and maintaining security monitoring systems, such as SIEM (Security Information and Event Management) tools.
*Prioritizing and remediating vulnerabilities based on risk assessments.
Operational Skills: -
*Developing, implementing, and enforcing security policies, standards, and procedures.
*Managing and maintaining secure configurations for systems, networks, and applications.
*Overseeing the timely application of security patches and updates to systems and software.
Analytical Skills: -
*Analyzing logs and event data from various sources to identify patterns and anomalies.
*Utilizing advanced analytics to detect and investigate security incidents.
*Conducting digital forensics investigations to uncover evidence of security breaches.
Collaboration and Teamwork: -
*Collaborating with other IT and security teams to enhance the organization's security posture.
*Coordinating response efforts during security incidents with internal and external stakeholders.
*Leading incident response teams and ensuring effective communication and collaboration.
SOC analyst
Posted today
Job Viewed
Job Description
Job Description
- Job Title: SOC Analyst
- Work Specification: Full-time
- Job Location: Dubai - United Arab Emirates
- Work Type: On-site
- Availability: Immediate
- Experience Required: Minimum 2 years
We are currently seeking qualified SOC Analyst L1 candidates for a prestigious Client in DUBAI. This is an ON-SITE job.
The
ideal candidate will be responsible for monitoring and analyzing
security incidents to protect our information systems, networks, and
data. This entry-level position is perfect for someone looking to start
their career in cybersecurity.
Key Responsibilities:
- Monitor security events from various sources, including SIEM, IDS/IPS, and firewall logs.
- Analyze and investigate potential security incidents to determine impact and root cause.
- Escalate security incidents to SOC Analyst L2 or other appropriate personnel as needed.
- Assist in the development and enhancement of SOC processes and procedures.
- Maintain security documentation and incident logs.
Required Skills and Qualifications:
- Bachelor s degree in Computer Science, Information Technology, or a related field.
- Basic understanding of cybersecurity principles and practices.
- Familiarity with security technologies such as firewalls, IDS/IPS, and SIEM systems.
- Strong analytical and problem-solving skills.
- Excellent verbal and written communication skills.
- Ability to work in a fast-paced, team-oriented environment.
Preferred Qualifications:
- Relevant certifications such as CompTIA Security+, CEH, or similar.
- Experience with incident response and handling.
- Knowledge of scripting languages like Python or PowerShell.
Be The First To Know
About the latest Soc analyst Jobs in United Arab Emirates !
SOC Analyst
Posted today
Job Viewed
Job Description
About Us
The ENTERTAINER is a leader in the Lifestyle industry providing our members with exclusive access to 2-for-1 vouchers for dining, delivery, attractions, shopping, and travel across the GCC and Singapore. We are dedicated to pushing the boundaries of customer satisfaction and business growth, continuously innovating to enhance the way our users engage with entertainment. Join us as we strive to transform the entertainment landscape through creativity and innovation.
We are seeking a highly skilled and proactive SOC Analyst to join our Security and Systems Monitoring Team. This role is critical in safeguarding both our cloud and on-premise infrastructure. The ideal candidate will be responsible for implementing, managing, and monitoring network security solutions in alignment with The Entertainer's best practice guidelines. You'll work closely with the SOC team, system administrators, and development teams to ensure continuous protection and effective incident response across our entire digital landscape.
Responsibilities- Monitor, configure, and maintain all network security and infrastructure monitoring systems.
- Collaborate with the SOC team to review and resolve security incidents and tickets.
- Work cross-functionally with Systems Development and HR to address escalations and ensure incident response plans are followed.
- Maintain and improve dashboards, alerts, and metrics for infrastructure and application monitoring.
- Install, configure, and maintain security and monitoring packages/software.
- Conduct regular security assessments for network software deployments and internal systems.
- Troubleshoot and resolve complex network issues to identify root causes and ensure optimal performance.
- Enhance network reliability, availability, and security by implementing preventive and corrective measures.
- Perform regular internal security reviews, penetration testing, and assessments on applications, servers, firewalls, and infrastructure.
- Implement data and network security protocols, including firewalls, UTM, IPS/IDS, ACS, and VPN technologies.
- Provide technical guidance and mentoring on best practices in security and monitoring.
- Set up, manage, and monitor automated alerts and incident escalation protocols.
- Maintain detailed documentation for all security tools, incidents, and monitoring processes.
- Bachelor's degree in Computer Science or a related field (Master's preferred).
- Solid knowledge of Linux-based systems.
- Experience with Python and PHP-based web applications & APIs.
- Strong understanding of Amazon Web Services (AWS).
- Familiarity with Cloudflare, Firewalls, AWS CloudTrail, GuardDuty, and VPC Flow Logs.
- Hands-on experience with open-source security and penetration testing tools.
- Web servers: Apache, Gunicorn, Nginx
- Databases: MySQL, Percona, MongoDB
- DevOps tools: Git, Redis, Celery, Elasticsearch
- AWS services: S3, CloudFront, EC2, RDS, Aurora
- AWS Certified Security Specialty certification is a strong plus.
#J-18808-Ljbffr
SOC Analyst
Posted today
Job Viewed
Job Description
VAM Systems is currently looking for SOC Analyst for our UAE operations with the following skillsets & terms and conditions:
Responsibilities- Minimum 5 years of experience in IT Security.
- Proven experience in:
- Administering and troubleshooting IS tools and applications.
- Managing Windows servers firewalls and endpoint security.
- Handling SOC alerts and incident response.
- Conducting internal audits and compliance reviews.
- Vulnerability Management — Detect, prioritize and coordinate remediation of vulnerabilities. Generate and export weekly vulnerability reports. Highlight persistent issues with relevant teams for remediation.
- Threat intelligence and prioritization .
- Information Security Systems — Administer and maintain IT security infrastructure. Perform troubleshooting upgrade and ensure operational readiness.
- SOC Activities — Provide Level 2 SOC expertise especially for incidents involving Microsoft allied solutions. Oversee SOC operations and incident response workflows. Apply ITIL and SANS-based methodologies for incident lifecycle management.
- Information Security Reviews — Conduct and oversee Infosec reviews as directed by the manager. Participate in ISR internal audits across IT systems network and enterprise solutions.
- Security Initiatives & Projects — Support ongoing IT security initiatives and projects. Collaborate on dashboards scorecards and automation of data refreshes for vulnerability and risk metrics.
- Joining time frame : 15-30 Days
- Remote Work : No
- Employment Type : Full-time
#J-18808-Ljbffr
L1 SOC Analyst
Posted today
Job Viewed
Job Description
We are seeking an enthusiastic and detail-oriented Level 1 SOC Analyst to join our Security Operations Center. As an Emirati national in this role, you will be the first line of defense in monitoring, detecting, and responding to security events, ensuring the protection of our organization's IT infrastructure and data.
Key Responsibilities
Monitor security alerts, logs, and events from SIEM and other monitoring tools.
Perform initial triage and escalation of potential security incidents.
Analyze suspicious emails, files, and network activity.
Provide first-level incident response support, following defined playbooks and escalation procedures.
Assist in identifying false positives and fine-tuning detection rules.
Document incidents, actions taken, and findings in SOC reports.
Escalate complex incidents to L2/L3 SOC Analysts when required.
Support vulnerability management and threat intelligence activities.
Ensure compliance with organizational security policies and procedures.
Requirements
Bachelor's degree in Computer Science, Information Security, or a related field
0–2 years of experience in cybersecurity, SOC, or IT operations (fresh graduates with cybersecurity knowledge are encouraged to apply).
Basic knowledge of cybersecurity concepts (malware, phishing, firewalls, intrusion detection, SIEM, etc.).
Familiarity with tools such as SIEM, antivirus, IDS/IPS, and endpoint security solutions.
Strong problem-solving, analytical, and communication skills.
Willingness to work in a 24/7 shift rotation environment.
Preferred Certifications (Optional / Advantageous)
CompTIA Security+
EC-Council Certified SOC Analyst (CSA)
Splunk Fundamentals / SIEM-related certification
Any entry-level cybersecurity certification