126 Threat Detection jobs in the United Arab Emirates
Threat Detection Expert
Posted today
Job Viewed
Job Description
The company's mission is to liberate the world from undetectable digital threats.
We empower organisations to augment and automate security operations by providing a best-of-breed threat detection and analysis platform.
Key Responsibilities- Work closely with sales teams in evaluating prospects' requirements throughout the sales process.
- Assist sales teams early in the sales phase with relevant product demonstrations highlighting the technical value proposition of our products.
- Guide and support prospects throughout the evaluation phase of the sales process.
- Provide technical training to our channel partners, prospects, and customers.
- Conduct product demonstrations during webinars, events, and industry trade shows.
- Communicate customer feedback to our products team.
- University degree in IT or a completed vocational training as an IT specialist.
- 3-5 years of experience in technical pre-sales roles.
- Strong technical background preferably in cybersecurity.
- Troubleshooting and working experience with Linux operating systems.
- Knowledge of networking infrastructure and protocols.
- Exceptional ability to present and communicate with both technical and sales functions.
- Ability to work with colleagues and customers across time zones.
- Knowledge in scripting and programming beneficial.
- Excellent writing and speaking skills in English.
- Ability to be self-driven and motivated.
Pipeline Threat Detection Specialist
Posted today
Job Viewed
Job Description
The Data Analyst will be responsible for the timely and accurate reporting of in-line inspection results. This includes review of customer requirement specifications, processing of in-line inspection data, analysis and identification of pipeline features and anomalies within processed data sets.
The selected candidate will work with project execution teams to ensure that the final results are of high quality and meet customer requirements.
This position requires strong analytical skills and the ability to communicate effectively with all levels of the organization.
Required Skills and Qualifications- Minimum 4-year technical or engineering degree from an accredited university
- Prior certification as ILI PQ LIII Data Analyst in UTWM, UTCD, EMAT; or ability to become certified
- Minimum 15 years of experience in the analysis of in-line inspection data
- Ability to learn proprietary software platforms; proficiency in Microsoft based applications is a must
PIPECARE Group offers comprehensive In-Line Inspection Services to identify and size pipeline threats. We utilize advanced technologies such as Magnetic Flux Leakage, Transverse Field Inspection, Ultrasound, and specialized tools to ensure precise detection and assessment of various pipeline anomalies.
Other Requirements- Ability to work for extended periods of time in a stationary position at computers and workstations
- Ability to pass vision acuity and color differentiation examinations
- Business travel may be required for internal training, internal meetings, site visits, and customer meetings (international travel may be required)
Vulnerability Management Specialist
Posted today
Job Viewed
Job Description
This is an exciting opportunity to join our team as a Vulnerability Management and Penetration Testing professional. The ideal candidate will have extensive experience in vulnerability management and penetration testing, with a strong understanding of enterprise environments.
Key ResponsibilitiesThe successful candidate will be responsible for the end-to-end vulnerability management lifecycle, including maintaining a complete asset inventory, operating and tuning vulnerability tooling, and integrating credential vaults. They will also be responsible for triaging vulnerabilities, escalating rapidly for external-facing criticals, and raising/tracking tickets in ITSM. Additionally, they will need to document time-bound risk acceptances with business owners, map controls to relevant frameworks, and keep exception registers current.
- Maintain a complete tagged asset inventory ensuring authenticated scans wherever feasible.
- Operate and tune vuln tooling, integrate credential vaults and schedule scans by asset criticality to minimize impact on production.
- Triage with CVSS v3.1 + EPSS + KEV + exploit availability, internet exposure, and asset criticality. Escalate rapidly for external-facing criticals.
- Raise/tracking tickets in ITSM, align with patch/change windows, provide compensating controls when patching is not immediately possible.
- Re-scan and perform targeted verification close findings only on evidence-backed remediation.
- Document time-bound risk acceptances with business owners, map controls to NIST/CIS/ISO 27001 and relevant local regs, keep exception register current.
- Weekly ops reports, monthly exec dashboards (exposure by BU/technology, SLA compliance, trends, risk burndown, top KEV exposure).
- Own external perimeter monitoring, drive takedown/closure of risky services and stale assets, track 'time-to-close' for external criticals.
- Plan/scoped annual PT calendar with clear Rules of Engagement, success criteria, data handling, rollback plans. Choose testing modality by risk/objective: Black-box, Gray-box, White-box.
- Perform targeted tests in-house, manage third-party engagements, ensure evidence/reproducibility and clear remediation guidance.
- Apply NIST SP 800-115, PTES, OWASP Testing Guide/ASVS (with AppSec), map to MITRE ATT&CK for detection-engineering feedback.
- Evaluate enterprise network/firewall-aware testing, validate rulebase hygiene, attack surface exposure, bypass paths, provide concrete policy/hardening recommendations.
- Experience: 5+ years in Vulnerability Management and Penetration Testing across enterprise environments.
- Tooling: Admin-level hands-on with ManageEngine/Tenable/Qualys/SentinelOne (or similar), familiarity with EASM tools, practical use of EPSS, CISA KEV, SBOM/CVE workflows.
- Testing: Proficiency with common PT tooling (e.g., Burp Suite, Nmap, Responder, BloodHound, Impacket, Kali), safe exploitation, and evidence capture.
- Platforms: Strong Windows/Linux, AD, network fundamentals, cloud security (Azure/AWS/GCP), containers/k8s basics.
- Scripting/Automation: Python/PowerShell/Bash for data wrangling and workflow automation.
- Frameworks: Working knowledge of NIST CSF/ISO 27001/CIS Controls, OWASP Top 10, MITRE ATT&CK mapping.
- Soft Skills: Clear written reporting for exec and technical audiences, stakeholder management, ability to negotiate patch windows and drive closure.
- Annual leave.
- Annual flight home.
- Life insurance plan.
- Medical insurance plan (with the option to upgrade at your own cost).
- Bonus scheme.
- Access to exclusive discounts.
Detection Engineer Threat Researcher
Posted today
Job Viewed
Job Description
Job Description
Job Title: Detection Engineer / Threat Researcher
Location: Remote (Candidates based in India only)
Employment Type: Permanent, Full-time
Employer: Dubai-based Cybersecurity Company
About The Role We are seeking a skilled and motivated Detection Engineer / Threat Researcher to join our cybersecurity team. You will play a critical role in detecting, analyzing, and responding to cyber threats, ensuring our clients environments remain secure. This role requires a proactive approach to threat hunting, creating detection rules, and contributing to the development of security operations capabilities.
Key Responsibilities
- Develop, fine-tune, and maintain detection rules and signatures for SIEM, EDR, and IDS/IPS platforms.
- Conduct threat hunting activities to proactively identify malicious activity and anomalies.
- Perform malware analysis, reverse engineering, and behavioral analysis of threats.
- Research and analyze the latest cyber threats, tactics, techniques, and procedures (TTPs).
- Work closely with SOC analysts to improve detection coverage and reduce false positives.
- Maintain detailed threat intelligence repositories and contribute to threat intelligence feeds.
- Collaborate with cross-functional teams to improve incident detection and response processes.
Required Skills & Qualifications
- 3+ years of experience in cybersecurity, threat detection, or threat research.
- Proficiency in using SIEM tools (e.g., Splunk, Elastic, Sentinel) and EDR platforms (e.g., CrowdStrike, SentinelOne).
- Strong understanding of MITRE ATT&CK framework and common attack techniques.
- Hands-on experience with detection rule creation (Sigma, YARA, Suricata, etc.).
- Knowledge of malware analysis tools (e.g., IDA Pro, Ghidra, Cuckoo Sandbox).
- Proficiency in scripting languages (Python, PowerShell, Bash) for automation and custom detections.
- Strong analytical skills with attention to detail and the ability to work independently.
Preferred Qualifications
- Relevant certifications such as GCFA, GCTI, GREM, OSCP, or SANS Blue Team certifications.
- Experience with cloud security monitoring (AWS, Azure, GCP).
- Familiarity with Threat Intelligence Platforms (TIPs).
Information Security Analyst
Posted today
Job Viewed
Job Description
Date Opened
08/19/2025
Job Type
Full time
Job Opening Status
In-progress
Work Experience
5+ years
Industry
Technology
Salary
12500
City
Abu Dhabi
State/Province
Abu Dhabi
Country
United Arab Emirates
Zip/Postal Code
51133
About UsRaqmiyat is a UAE-based IT and digital transformation company specializing in consulting, staffing, and enterprise technology solutions. We empower banking, government, and enterprise clients across the Middle East to achieve their digital objectives.
Job DescriptionKey Responsibilities:
Penetration Testing and Red Teaming:
- Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
- Develop and execute custom tools and scripts to automate testing and exploitation processes.
- Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
- Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
- ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
- ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.
Threat Modeling and Risk Assessment:
- Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
- Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
- Provide recommendations for remediation and mitigation strategies
Incident Response and Crisis Management: - Participate in security incident response and crisis management efforts as needed
- Collaborate with incident response teams to contain and remediate security incidents
- Provide technical expertise and guidance during incident response efforts
- Security Research and Development:
- Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
- Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
- Participate in security research and development efforts to identify and develop new testing techniques and methodologies
Information Security Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities:
Penetration Testing and Red Teaming:
- Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
- Develop and execute custom tools and scripts to automate testing and exploitation processes.
- Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
- Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
- ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
- ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.
Threat Modeling and Risk Assessment:
- Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
- Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
- Provide recommendations for remediation and mitigation strategiesIncident Response and Crisis Management:
- Participate in security incident response and crisis management efforts as needed
- Collaborate with incident response teams to contain and remediate security incidents
- Provide technical expertise and guidance during incident response efforts
- Security Research and Development:
- Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
- Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
- Participate in security research and development efforts to identify and develop new testing techniques and methodologies
Information Security Analyst
Posted today
Job Viewed
Job Description
We have an urgent requirement for Information Security Analyst for our client based at Abu Dhabi
Key Responsibilities
Penetration Testing and Red Teaming:
- Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
- Develop and execute custom tools and scripts to automate testing and exploitation processes.
- Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
- Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
- ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
- ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.
Vulnerability Assessment
- Perform thorough vulnerability assessments to identify and prioritize security weaknesses.
- Utilize industry-standard tools such as Qualys, Nessus or Nexpose and methodologies to uncover vulnerabilities in various environments.
- Provide actionable recommendations for remediation and mitigation strategies.
- Patch management
Threat Modeling And Risk Assessment
- Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
- Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
- Provide recommendations for remediation and mitigation strategies
Incident Response And Crisis Management
- Participate in security incident response and crisis management efforts as needed
- Collaborate with incident response teams to contain and remediate security incidents
- Provide technical expertise and guidance during incident response efforts
Security Research And Development
- Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
- Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
- Participate in security research and development efforts to identify and develop new testing techniques and methodologies
Collaboration And Communication
- Collaborate with development teams to implement security patches and fixes
- Provide technical guidance and support to development teams on security-related issues
- Communicate complex technical information to non-technical stakeholders in a clear and concise manner
Reporting And Documentation
- Develop and maintain detailed reports on findings, including vulnerability assessments, penetration testing results, and recommendations for remediation
- Document testing methodologies, tools, and results in a clear and concise manner
- Maintain accurate and up-to-date records of testing activities and results
Mandatory Requirements
- Bachelor's degree in Computer Science, Information Assurance, or a related field
- OSCP, CEH, or other relevant certifications
- 5+ years of experience in penetration testing, vulnerability assessment, or a related field
- Strong understanding of networking protocols, operating systems, and applications
- Proficiency in programming languages such as Python, C++, or Java
- Experience with penetration testing frameworks and tools such as Nmap, Nessus, Burp Suite, or Metasploit
- Strong analytical and problem-solving skills
- Excellent communication and reporting skills
- Ability to work independently and as part of a team
- Strong attention to detail and ability to maintain accurate records
- Ability to work in a fast-paced environment with tight deadlines
Preferred Additional Requirements
- Experience with cloud-based technologies and cloud security
- Familiarity with Agile development methodologies
- Strong understanding of compliance and regulatory requirements (e.g., GDPR, PCI-DSS)
- Experience with security orchestration, automation, and response (SOAR) tools
- Familiarity with threat intelligence and threat hunting
Skills: security,information,penetration testing,vulnerability
Be The First To Know
About the latest Threat detection Jobs in United Arab Emirates !
Information Security Analyst
Posted today
Job Viewed
Job Description
We have an urgent requirement for Information Security Analyst for our client based at Abu Dhabi
Key Responsibilities- Penetration Testing and Red Teaming: Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
- Develop and execute custom tools and scripts to automate testing and exploitation processes.
- Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
- Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
- ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
- ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.
- Perform thorough vulnerability assessments to identify and prioritize security weaknesses.
- Utilize industry-standard tools such as Qualys, Nessus or Nexpose and methodologies to uncover vulnerabilities in various environments.
- Provide actionable recommendations for remediation and mitigation strategies.
- Patch management
- Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities.
- Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities.
- Provide recommendations for remediation and mitigation strategies.
- Participate in security incident response and crisis management efforts as needed.
- Collaborate with incident response teams to contain and remediate security incidents.
- Provide technical expertise and guidance during incident response efforts.
- Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly.
- Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies.
- Participate in security research and development efforts to identify and develop new testing techniques and methodologies.
- Collaborate with development teams to implement security patches and fixes.
- Provide technical guidance and support to development teams on security-related issues.
- Communicate complex technical information to non-technical stakeholders in a clear and concise manner.
- Develop and maintain detailed reports on findings, including vulnerability assessments, penetration testing results, and recommendations for remediation.
- Document testing methodologies, tools, and results in a clear and concise manner.
- Maintain accurate and up-to-date records of testing activities and results.
- Bachelor's degree in Computer Science, Information Assurance, or a related field
- OSCP, CEH, or other relevant certifications
- 5+ years of experience in penetration testing, vulnerability assessment, or a related field
- Strong understanding of networking protocols, operating systems, and applications
- Proficiency in programming languages such as Python, C++, or Java
- Experience with penetration testing frameworks and tools such as Nmap, Nessus, Burp Suite, or Metasploit
- Strong analytical and problem-solving skills
- Excellent communication and reporting skills
- Ability to work independently and as part of a team
- Strong attention to detail and ability to maintain accurate records
- Ability to work in a fast-paced environment with tight deadlines
- Experience with cloud-based technologies and cloud security
- Familiarity with Agile development methodologies
- Strong understanding of compliance and regulatory requirements (e.g., GDPR, PCI-DSS)
- Experience with security orchestration, automation, and response (SOAR) tools
- Familiarity with threat intelligence and threat hunting
- Associate
- Full-time
- Information Technology
- Technology, Information and Internet
Information Security Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities
Penetration Testing and Red Teaming:
- Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
- Develop and execute custom tools and scripts to automate testing and exploitation processes.
- Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
- Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
- ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
- ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.
- Perform thorough vulnerability assessments to identify and prioritize security weaknesses.
- Utilize industry-standard tools such as Qualys, Nessus or Nexpose and methodologies to uncover vulnerabilities in various environments.
- Provide actionable recommendations for remediation and mitigation strategies.
- Patch management
- Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
- Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
- Provide recommendations for remediation and mitigation strategies
- Participate in security incident response and crisis management efforts as needed
- Collaborate with incident response teams to contain and remediate security incidents
- Provide technical expertise and guidance during incident response efforts
- Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
- Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
- Participate in security research and development efforts to identify and develop new testing techniques and methodologies
- Collaborate with development teams to implement security patches and fixes
- Provide technical guidance and support to development teams on security-related issues
- Communicate complex technical information to non-technical stakeholders in a clear and concise manner
- Develop and maintain detailed reports on findings, including vulnerability assessments, penetration testing results, and recommendations for remediation
- Document testing methodologies, tools, and results in a clear and concise manner
- Maintain accurate and up-to-date records of testing activities and results
- Bachelor's degree in Computer Science, Information Assurance, or a related field
- OSCP, CEH, or other relevant certifications
- 5+ years of experience in penetration testing, vulnerability assessment, or a related field
- Strong understanding of networking protocols, operating systems, and applications
- Proficiency in programming languages such as Python, C++, or Java
- Experience with penetration testing frameworks and tools such as Nmap, Nessus, Burp Suite, or Metasploit
- Strong analytical and problem-solving skills
- Excellent communication and reporting skills
- Ability to work independently and as part of a team
- Strong attention to detail and ability to maintain accurate records
- Ability to work in a fast-paced environment with tight deadlines
- Experience with cloud-based technologies and cloud security
- Familiarity with Agile development methodologies
- Strong understanding of compliance and regulatory requirements (e.g., GDPR, PCI-DSS)
- Experience with security orchestration, automation, and response (SOAR) tools
- Familiarity with threat intelligence and threat hunting
#J-18808-Ljbffr
Information Security Analyst
Posted today
Job Viewed
Job Description
Conduct penetration testing and red teaming on systems networks applications and mobile platforms to identify vulnerabilities. Develop and use custom tools/scripts to automate testing and exploitation. Simulate advanced persistent threats (APTs) to assess security controls and incident response. Continuously discover catalog and monitor all assets for attack surface management (ASM). Perform vulnerability assessments using industry-standard tools (e.g. Qualys Nessus Nexpose) and methodologies. Prioritize and provide actionable remediation recommendations for identified vulnerabilities. Participate in patch management activities. Conduct threat modeling and risk assessments to uncover and prioritize potential attack vectors. Collaborate with incident response teams to contain and remediate security incidents. Provide technical guidance and expertise during incident response and crisis management. Stay updated on latest security threats trends and tools; adapt testing methodologies as needed. Participate in security research and develop new testing techniques/methodologies. Work with development teams to implement security patches and provide security guidance. Communicate complex technical findings to both technical and non-technical stakeholders. Develop and maintain detailed documentation and reports on testing results methodologies and remediation steps. Maintain accurate records of all security testing and assessment activities. Ensure compliance with relevant security certifications and regulatory requirements. Demonstrate strong programming skills (e.g. Python C Java) and knowledge of security tools (e.g. Nmap Burp Suite Metasploit). Work independently and collaboratively in a fast-paced environment managing multiple priorities and deadlines.
Responsibilities- Conduct penetration testing and red teaming on systems networks applications and mobile platforms to identify vulnerabilities.
- Develop and use custom tools/scripts to automate testing and exploitation.
- Simulate advanced persistent threats (APTs) to assess security controls and incident response.
- Continuously discover catalog and monitor all assets for attack surface management (ASM).
- Perform vulnerability assessments using industry-standard tools (e.g. Qualys Nessus Nexpose) and methodologies.
- Prioritize and provide actionable remediation recommendations for identified vulnerabilities.
- Participate in patch management activities.
- Conduct threat modeling and risk assessments to uncover and prioritize potential attack vectors.
- Collaborate with incident response teams to contain and remediate security incidents.
- Provide technical guidance and expertise during incident response and crisis management.
- Stay updated on latest security threats trends and tools; adapt testing methodologies as needed.
- Participate in security research and develop new testing techniques/methodologies.
- Work with development teams to implement security patches and provide security guidance.
- Communicate complex technical findings to both technical and non-technical stakeholders.
- Develop and maintain detailed documentation and reports on testing results methodologies and remediation steps.
- Maintain accurate records of all security testing and assessment activities.
- Ensure compliance with relevant security certifications and regulatory requirements.
- Demonstrate strong programming skills (e.g. Python C Java) and knowledge of security tools (e.g. Nmap Burp Suite Metasploit).
- Work independently and collaboratively in a fast-paced environment managing multiple priorities and deadlines.
- Strong programming skills (e.g. Python, C, Java).
- Knowledge of security tools (Nmap, Burp Suite, Metasploit).
- Ability to communicate complex technical findings to technical and non-technical stakeholders.
- Experience with incident response, crisis management, and patch management activities.
#J-18808-Ljbffr