126 Threat Detection jobs in the United Arab Emirates

Threat Detection Expert

Zayed City, Abu Dhabi beBeeSecurity

Posted today

Job Viewed

Tap Again To Close

Job Description

Technical Security Specialist

The company's mission is to liberate the world from undetectable digital threats.

We empower organisations to augment and automate security operations by providing a best-of-breed threat detection and analysis platform.

Key Responsibilities
  • Work closely with sales teams in evaluating prospects' requirements throughout the sales process.
  • Assist sales teams early in the sales phase with relevant product demonstrations highlighting the technical value proposition of our products.
  • Guide and support prospects throughout the evaluation phase of the sales process.
  • Provide technical training to our channel partners, prospects, and customers.
  • Conduct product demonstrations during webinars, events, and industry trade shows.
  • Communicate customer feedback to our products team.
Requirements
  • University degree in IT or a completed vocational training as an IT specialist.
  • 3-5 years of experience in technical pre-sales roles.
  • Strong technical background preferably in cybersecurity.
  • Troubleshooting and working experience with Linux operating systems.
  • Knowledge of networking infrastructure and protocols.
  • Exceptional ability to present and communicate with both technical and sales functions.
  • Ability to work with colleagues and customers across time zones.
  • Knowledge in scripting and programming beneficial.
  • Excellent writing and speaking skills in English.
  • Ability to be self-driven and motivated.
This advertiser has chosen not to accept applicants from your region.

Pipeline Threat Detection Specialist

Fujairah, Fujairah beBeeDataAnalyst

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Overview

The Data Analyst will be responsible for the timely and accurate reporting of in-line inspection results. This includes review of customer requirement specifications, processing of in-line inspection data, analysis and identification of pipeline features and anomalies within processed data sets.

The selected candidate will work with project execution teams to ensure that the final results are of high quality and meet customer requirements.

This position requires strong analytical skills and the ability to communicate effectively with all levels of the organization.

Required Skills and Qualifications
  • Minimum 4-year technical or engineering degree from an accredited university
  • Prior certification as ILI PQ LIII Data Analyst in UTWM, UTCD, EMAT; or ability to become certified
  • Minimum 15 years of experience in the analysis of in-line inspection data
  • Ability to learn proprietary software platforms; proficiency in Microsoft based applications is a must
Benefits

PIPECARE Group offers comprehensive In-Line Inspection Services to identify and size pipeline threats. We utilize advanced technologies such as Magnetic Flux Leakage, Transverse Field Inspection, Ultrasound, and specialized tools to ensure precise detection and assessment of various pipeline anomalies.

Other Requirements
  • Ability to work for extended periods of time in a stationary position at computers and workstations
  • Ability to pass vision acuity and color differentiation examinations
  • Business travel may be required for internal training, internal meetings, site visits, and customer meetings (international travel may be required)
This advertiser has chosen not to accept applicants from your region.

Vulnerability Management Specialist

Dubai, Dubai beBeeCybersecurity

Posted today

Job Viewed

Tap Again To Close

Job Description

About This Role

This is an exciting opportunity to join our team as a Vulnerability Management and Penetration Testing professional. The ideal candidate will have extensive experience in vulnerability management and penetration testing, with a strong understanding of enterprise environments.

Key Responsibilities

The successful candidate will be responsible for the end-to-end vulnerability management lifecycle, including maintaining a complete asset inventory, operating and tuning vulnerability tooling, and integrating credential vaults. They will also be responsible for triaging vulnerabilities, escalating rapidly for external-facing criticals, and raising/tracking tickets in ITSM. Additionally, they will need to document time-bound risk acceptances with business owners, map controls to relevant frameworks, and keep exception registers current.

  • Maintain a complete tagged asset inventory ensuring authenticated scans wherever feasible.
  • Operate and tune vuln tooling, integrate credential vaults and schedule scans by asset criticality to minimize impact on production.
  • Triage with CVSS v3.1 + EPSS + KEV + exploit availability, internet exposure, and asset criticality. Escalate rapidly for external-facing criticals.
  • Raise/tracking tickets in ITSM, align with patch/change windows, provide compensating controls when patching is not immediately possible.
  • Re-scan and perform targeted verification close findings only on evidence-backed remediation.
  • Document time-bound risk acceptances with business owners, map controls to NIST/CIS/ISO 27001 and relevant local regs, keep exception register current.
  • Weekly ops reports, monthly exec dashboards (exposure by BU/technology, SLA compliance, trends, risk burndown, top KEV exposure).
Additional Responsibilities
  • Own external perimeter monitoring, drive takedown/closure of risky services and stale assets, track 'time-to-close' for external criticals.
  • Plan/scoped annual PT calendar with clear Rules of Engagement, success criteria, data handling, rollback plans. Choose testing modality by risk/objective: Black-box, Gray-box, White-box.
  • Perform targeted tests in-house, manage third-party engagements, ensure evidence/reproducibility and clear remediation guidance.
  • Apply NIST SP 800-115, PTES, OWASP Testing Guide/ASVS (with AppSec), map to MITRE ATT&CK for detection-engineering feedback.
  • Evaluate enterprise network/firewall-aware testing, validate rulebase hygiene, attack surface exposure, bypass paths, provide concrete policy/hardening recommendations.
Requirements
  • Experience: 5+ years in Vulnerability Management and Penetration Testing across enterprise environments.
  • Tooling: Admin-level hands-on with ManageEngine/Tenable/Qualys/SentinelOne (or similar), familiarity with EASM tools, practical use of EPSS, CISA KEV, SBOM/CVE workflows.
  • Testing: Proficiency with common PT tooling (e.g., Burp Suite, Nmap, Responder, BloodHound, Impacket, Kali), safe exploitation, and evidence capture.
  • Platforms: Strong Windows/Linux, AD, network fundamentals, cloud security (Azure/AWS/GCP), containers/k8s basics.
  • Scripting/Automation: Python/PowerShell/Bash for data wrangling and workflow automation.
  • Frameworks: Working knowledge of NIST CSF/ISO 27001/CIS Controls, OWASP Top 10, MITRE ATT&CK mapping.
  • Soft Skills: Clear written reporting for exec and technical audiences, stakeholder management, ability to negotiate patch windows and drive closure.
Benefits
  • Annual leave.
  • Annual flight home.
  • Life insurance plan.
  • Medical insurance plan (with the option to upgrade at your own cost).
  • Bonus scheme.
  • Access to exclusive discounts.
This advertiser has chosen not to accept applicants from your region.

Detection Engineer Threat Researcher

AED120000 - AED240000 Y ITHR Technologies Consulting LLC

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description

Job Title: Detection Engineer / Threat Researcher

Location: Remote (Candidates based in India only)

Employment Type: Permanent, Full-time

Employer: Dubai-based Cybersecurity Company

About The Role We are seeking a skilled and motivated Detection Engineer / Threat Researcher to join our cybersecurity team. You will play a critical role in detecting, analyzing, and responding to cyber threats, ensuring our clients environments remain secure. This role requires a proactive approach to threat hunting, creating detection rules, and contributing to the development of security operations capabilities.

Key Responsibilities

  • Develop, fine-tune, and maintain detection rules and signatures for SIEM, EDR, and IDS/IPS platforms.
  • Conduct threat hunting activities to proactively identify malicious activity and anomalies.
  • Perform malware analysis, reverse engineering, and behavioral analysis of threats.
  • Research and analyze the latest cyber threats, tactics, techniques, and procedures (TTPs).
  • Work closely with SOC analysts to improve detection coverage and reduce false positives.
  • Maintain detailed threat intelligence repositories and contribute to threat intelligence feeds.
  • Collaborate with cross-functional teams to improve incident detection and response processes.

Required Skills & Qualifications

  • 3+ years of experience in cybersecurity, threat detection, or threat research.
  • Proficiency in using SIEM tools (e.g., Splunk, Elastic, Sentinel) and EDR platforms (e.g., CrowdStrike, SentinelOne).
  • Strong understanding of MITRE ATT&CK framework and common attack techniques.
  • Hands-on experience with detection rule creation (Sigma, YARA, Suricata, etc.).
  • Knowledge of malware analysis tools (e.g., IDA Pro, Ghidra, Cuckoo Sandbox).
  • Proficiency in scripting languages (Python, PowerShell, Bash) for automation and custom detections.
  • Strong analytical skills with attention to detail and the ability to work independently.

Preferred Qualifications

  • Relevant certifications such as GCFA, GCTI, GREM, OSCP, or SANS Blue Team certifications.
  • Experience with cloud security monitoring (AWS, Azure, GCP).
  • Familiarity with Threat Intelligence Platforms (TIPs).
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

AED50000 - AED60000 Y Raqmiyat

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Information

Date Opened

08/19/2025

Job Type

Full time

Job Opening Status

In-progress

Work Experience

5+ years

Industry

Technology

Salary

12500

City

Abu Dhabi

State/Province

Abu Dhabi

Country

United Arab Emirates

Zip/Postal Code

51133

About Us

Raqmiyat is a UAE-based IT and digital transformation company specializing in consulting, staffing, and enterprise technology solutions. We empower banking, government, and enterprise clients across the Middle East to achieve their digital objectives.

Job Description

Key Responsibilities:

Penetration Testing and Red Teaming:

  • Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
  • Develop and execute custom tools and scripts to automate testing and exploitation processes.
  • Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
  • Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
  • ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
  • ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.

Threat Modeling and Risk Assessment:

  • Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
  • Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
  • Provide recommendations for remediation and mitigation strategies

    Incident Response and Crisis Management:
  • Participate in security incident response and crisis management efforts as needed
  • Collaborate with incident response teams to contain and remediate security incidents
  • Provide technical expertise and guidance during incident response efforts
  • Security Research and Development:
  • Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
  • Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
  • Participate in security research and development efforts to identify and develop new testing techniques and methodologies
Benefits
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

AED90000 - AED120000 Y Raqmiyat L.L.C

Posted today

Job Viewed

Tap Again To Close

Job Description

Key Responsibilities:

Penetration Testing and Red Teaming:

  • Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
  • Develop and execute custom tools and scripts to automate testing and exploitation processes.
  • Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
  • Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
  • ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
  • ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.

Threat Modeling and Risk Assessment:

  • Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
  • Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
  • Provide recommendations for remediation and mitigation strategiesIncident Response and Crisis Management:
  • Participate in security incident response and crisis management efforts as needed
  • Collaborate with incident response teams to contain and remediate security incidents
  • Provide technical expertise and guidance during incident response efforts
  • Security Research and Development:
  • Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
  • Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
  • Participate in security research and development efforts to identify and develop new testing techniques and methodologies
Benefits
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

AED120000 - AED250000 Y TAT IT Technolgies

Posted today

Job Viewed

Tap Again To Close

Job Description

We have an urgent requirement for Information Security Analyst for our client based at Abu Dhabi
Key Responsibilities
Penetration Testing and Red Teaming:

  • Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
  • Develop and execute custom tools and scripts to automate testing and exploitation processes.
  • Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
  • Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
  • ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
  • ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.

Vulnerability Assessment

  • Perform thorough vulnerability assessments to identify and prioritize security weaknesses.
  • Utilize industry-standard tools such as Qualys, Nessus or Nexpose and methodologies to uncover vulnerabilities in various environments.
  • Provide actionable recommendations for remediation and mitigation strategies.
  • Patch management

Threat Modeling And Risk Assessment

  • Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
  • Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
  • Provide recommendations for remediation and mitigation strategies

Incident Response And Crisis Management

  • Participate in security incident response and crisis management efforts as needed
  • Collaborate with incident response teams to contain and remediate security incidents
  • Provide technical expertise and guidance during incident response efforts

Security Research And Development

  • Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
  • Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
  • Participate in security research and development efforts to identify and develop new testing techniques and methodologies

Collaboration And Communication

  • Collaborate with development teams to implement security patches and fixes
  • Provide technical guidance and support to development teams on security-related issues
  • Communicate complex technical information to non-technical stakeholders in a clear and concise manner

Reporting And Documentation

  • Develop and maintain detailed reports on findings, including vulnerability assessments, penetration testing results, and recommendations for remediation
  • Document testing methodologies, tools, and results in a clear and concise manner
  • Maintain accurate and up-to-date records of testing activities and results

Mandatory Requirements

  • Bachelor's degree in Computer Science, Information Assurance, or a related field
  • OSCP, CEH, or other relevant certifications
  • 5+ years of experience in penetration testing, vulnerability assessment, or a related field
  • Strong understanding of networking protocols, operating systems, and applications
  • Proficiency in programming languages such as Python, C++, or Java
  • Experience with penetration testing frameworks and tools such as Nmap, Nessus, Burp Suite, or Metasploit
  • Strong analytical and problem-solving skills
  • Excellent communication and reporting skills
  • Ability to work independently and as part of a team
  • Strong attention to detail and ability to maintain accurate records
  • Ability to work in a fast-paced environment with tight deadlines

Preferred Additional Requirements

  • Experience with cloud-based technologies and cloud security
  • Familiarity with Agile development methodologies
  • Strong understanding of compliance and regulatory requirements (e.g., GDPR, PCI-DSS)
  • Experience with security orchestration, automation, and response (SOAR) tools
  • Familiarity with threat intelligence and threat hunting

Skills: security,information,penetration testing,vulnerability

This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Threat detection Jobs in United Arab Emirates !

Information Security Analyst

Abu Dhabi, Abu Dhabi TAT IT Technolgies

Posted today

Job Viewed

Tap Again To Close

Job Description

We have an urgent requirement for Information Security Analyst for our client based at Abu Dhabi

Key Responsibilities
  • Penetration Testing and Red Teaming: Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
  • Develop and execute custom tools and scripts to automate testing and exploitation processes.
  • Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
  • Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
  • ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
  • ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.
Vulnerability Assessment
  • Perform thorough vulnerability assessments to identify and prioritize security weaknesses.
  • Utilize industry-standard tools such as Qualys, Nessus or Nexpose and methodologies to uncover vulnerabilities in various environments.
  • Provide actionable recommendations for remediation and mitigation strategies.
  • Patch management
Threat Modeling And Risk Assessment
  • Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities.
  • Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities.
  • Provide recommendations for remediation and mitigation strategies.
Incident Response And Crisis Management
  • Participate in security incident response and crisis management efforts as needed.
  • Collaborate with incident response teams to contain and remediate security incidents.
  • Provide technical expertise and guidance during incident response efforts.
Security Research And Development
  • Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly.
  • Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies.
  • Participate in security research and development efforts to identify and develop new testing techniques and methodologies.
Collaboration And Communication
  • Collaborate with development teams to implement security patches and fixes.
  • Provide technical guidance and support to development teams on security-related issues.
  • Communicate complex technical information to non-technical stakeholders in a clear and concise manner.
Reporting And Documentation
  • Develop and maintain detailed reports on findings, including vulnerability assessments, penetration testing results, and recommendations for remediation.
  • Document testing methodologies, tools, and results in a clear and concise manner.
  • Maintain accurate and up-to-date records of testing activities and results.
Mandatory Requirements
  • Bachelor's degree in Computer Science, Information Assurance, or a related field
  • OSCP, CEH, or other relevant certifications
  • 5+ years of experience in penetration testing, vulnerability assessment, or a related field
  • Strong understanding of networking protocols, operating systems, and applications
  • Proficiency in programming languages such as Python, C++, or Java
  • Experience with penetration testing frameworks and tools such as Nmap, Nessus, Burp Suite, or Metasploit
  • Strong analytical and problem-solving skills
  • Excellent communication and reporting skills
  • Ability to work independently and as part of a team
  • Strong attention to detail and ability to maintain accurate records
  • Ability to work in a fast-paced environment with tight deadlines
Preferred Additional Requirements
  • Experience with cloud-based technologies and cloud security
  • Familiarity with Agile development methodologies
  • Strong understanding of compliance and regulatory requirements (e.g., GDPR, PCI-DSS)
  • Experience with security orchestration, automation, and response (SOAR) tools
  • Familiarity with threat intelligence and threat hunting
Seniority level
  • Associate
Employment type
  • Full-time
Job function
  • Information Technology
Industries
  • Technology, Information and Internet
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Abu Dhabi, Abu Dhabi TAT IT Technolgies

Posted today

Job Viewed

Tap Again To Close

Job Description

We have an urgent requirement for Information Security Analyst for our client based at Abu Dhabi

Key Responsibilities

Penetration Testing and Red Teaming:
  • Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
  • Develop and execute custom tools and scripts to automate testing and exploitation processes.
  • Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
  • Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
  • ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
  • ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.

Vulnerability Assessment
  • Perform thorough vulnerability assessments to identify and prioritize security weaknesses.
  • Utilize industry-standard tools such as Qualys, Nessus or Nexpose and methodologies to uncover vulnerabilities in various environments.
  • Provide actionable recommendations for remediation and mitigation strategies.
  • Patch management

Threat Modeling And Risk Assessment
  • Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
  • Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
  • Provide recommendations for remediation and mitigation strategies

Incident Response And Crisis Management
  • Participate in security incident response and crisis management efforts as needed
  • Collaborate with incident response teams to contain and remediate security incidents
  • Provide technical expertise and guidance during incident response efforts

Security Research And Development
  • Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
  • Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
  • Participate in security research and development efforts to identify and develop new testing techniques and methodologies

Collaboration And Communication
  • Collaborate with development teams to implement security patches and fixes
  • Provide technical guidance and support to development teams on security-related issues
  • Communicate complex technical information to non-technical stakeholders in a clear and concise manner

Reporting And Documentation
  • Develop and maintain detailed reports on findings, including vulnerability assessments, penetration testing results, and recommendations for remediation
  • Document testing methodologies, tools, and results in a clear and concise manner
  • Maintain accurate and up-to-date records of testing activities and results

Mandatory Requirements
  • Bachelor's degree in Computer Science, Information Assurance, or a related field
  • OSCP, CEH, or other relevant certifications
  • 5+ years of experience in penetration testing, vulnerability assessment, or a related field
  • Strong understanding of networking protocols, operating systems, and applications
  • Proficiency in programming languages such as Python, C++, or Java
  • Experience with penetration testing frameworks and tools such as Nmap, Nessus, Burp Suite, or Metasploit
  • Strong analytical and problem-solving skills
  • Excellent communication and reporting skills
  • Ability to work independently and as part of a team
  • Strong attention to detail and ability to maintain accurate records
  • Ability to work in a fast-paced environment with tight deadlines

Preferred Additional Requirements
  • Experience with cloud-based technologies and cloud security
  • Familiarity with Agile development methodologies
  • Strong understanding of compliance and regulatory requirements (e.g., GDPR, PCI-DSS)
  • Experience with security orchestration, automation, and response (SOAR) tools
  • Familiarity with threat intelligence and threat hunting

Skills: security,information,penetration testing,vulnerability
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Abu Dhabi, Abu Dhabi Mindtel

Posted today

Job Viewed

Tap Again To Close

Job Description

Overview

Conduct penetration testing and red teaming on systems networks applications and mobile platforms to identify vulnerabilities. Develop and use custom tools/scripts to automate testing and exploitation. Simulate advanced persistent threats (APTs) to assess security controls and incident response. Continuously discover catalog and monitor all assets for attack surface management (ASM). Perform vulnerability assessments using industry-standard tools (e.g. Qualys Nessus Nexpose) and methodologies. Prioritize and provide actionable remediation recommendations for identified vulnerabilities. Participate in patch management activities. Conduct threat modeling and risk assessments to uncover and prioritize potential attack vectors. Collaborate with incident response teams to contain and remediate security incidents. Provide technical guidance and expertise during incident response and crisis management. Stay updated on latest security threats trends and tools; adapt testing methodologies as needed. Participate in security research and develop new testing techniques/methodologies. Work with development teams to implement security patches and provide security guidance. Communicate complex technical findings to both technical and non-technical stakeholders. Develop and maintain detailed documentation and reports on testing results methodologies and remediation steps. Maintain accurate records of all security testing and assessment activities. Ensure compliance with relevant security certifications and regulatory requirements. Demonstrate strong programming skills (e.g. Python C Java) and knowledge of security tools (e.g. Nmap Burp Suite Metasploit). Work independently and collaboratively in a fast-paced environment managing multiple priorities and deadlines.

Responsibilities
  • Conduct penetration testing and red teaming on systems networks applications and mobile platforms to identify vulnerabilities.
  • Develop and use custom tools/scripts to automate testing and exploitation.
  • Simulate advanced persistent threats (APTs) to assess security controls and incident response.
  • Continuously discover catalog and monitor all assets for attack surface management (ASM).
  • Perform vulnerability assessments using industry-standard tools (e.g. Qualys Nessus Nexpose) and methodologies.
  • Prioritize and provide actionable remediation recommendations for identified vulnerabilities.
  • Participate in patch management activities.
  • Conduct threat modeling and risk assessments to uncover and prioritize potential attack vectors.
  • Collaborate with incident response teams to contain and remediate security incidents.
  • Provide technical guidance and expertise during incident response and crisis management.
  • Stay updated on latest security threats trends and tools; adapt testing methodologies as needed.
  • Participate in security research and develop new testing techniques/methodologies.
  • Work with development teams to implement security patches and provide security guidance.
  • Communicate complex technical findings to both technical and non-technical stakeholders.
  • Develop and maintain detailed documentation and reports on testing results methodologies and remediation steps.
  • Maintain accurate records of all security testing and assessment activities.
  • Ensure compliance with relevant security certifications and regulatory requirements.
  • Demonstrate strong programming skills (e.g. Python C Java) and knowledge of security tools (e.g. Nmap Burp Suite Metasploit).
  • Work independently and collaboratively in a fast-paced environment managing multiple priorities and deadlines.
Qualifications
  • Strong programming skills (e.g. Python, C, Java).
  • Knowledge of security tools (Nmap, Burp Suite, Metasploit).
  • Ability to communicate complex technical findings to technical and non-technical stakeholders.
  • Experience with incident response, crisis management, and patch management activities.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Threat Detection Jobs