Get new jobs by email
AED6000 - 8000 per month
...technologies, and network segmentation. • Experience with SD-WAN design and implementation (Fortinet SD-WAN preferred). • Familiarity with SIEM integration, log forwarding (Syslog/CEF), and network-based threat detection. • Bachelor’s degree in Computer Science,...- ...governance to help ensure security controls are implemented as designed, security integration points are validated end-to-end (IAM, logging/SIEM, segmentation, encryption/key management), and that security risks/issues and evidence are managed effectively through delivery....
- ...environments (AWS, Azure, GCP) using DevSecOps practices. Manage IAM/PAM, EDR/XDR, patching, DLP, and endpoint security. Operate SIEM, SOAR, threat hunting, and incident response. Oversee third-party risk management and support audits/regulatory requirements....
AED6000 - 8000 per month
...with email security (anti-phishing, anti-spam, safe attachments/links) and incident investigation workflows. • Familiarity with SIEM/SOAR integration of Microsoft security signals and log forwarding. • Bachelor’s degree in Computer Science, Information Technology...- ...Security & Monitoring Configure and manage firewalls, antivirus, and EDR solutions Monitor systems using security tools (e.g. SIEM solutions) Ensure overall infrastructure security and compliance Network & Office IT Operations Maintain LAN/WAN connectivity...
- ...Responsibilities Implement and manage PAM solutions (CyberArk preferred) Handle secrets lifecycle management and IAM Integrate with SIEM and monitoring tools Ensure compliance with security and audit standards Required Skills Strong experience in PAM, IAM, and...
- ...as an engineer at enterprise level Work as the senior member of the security engineering team Training junior members of the SIEM team Required Skills Experience of tool such as SIEM, Firewalls, DLP, IAM Strong background in security engineering Experience...
- ...Defender, and Microsoft Sentinel • Strong understanding of ICS/OT architecture, Purdue model, and industrial environments • Experience in SIEM correlation, alert tuning, and use case development • Knowledge of ICS protocols, OT threat vectors, and vulnerability management •...
- ...deployment and operational experience. ~ Strong background in incident response, threat hunting, and log analysis. ~ Proficiency with SIEM, EDR, and other security monitoring technologies. ~ Solid knowledge of network security, endpoint protection, and cloud...
- ...environments Understanding, knowledge or experience with VPN and remote access challenges Understanding, knowledge or experience with SIEM and log analytics platforms Client OS fundamentals and software distribution Other desirable skills areas include:...
- ...manage the Group SOC function, overseeing threat monitoring, investigation, containment, eradication, and recovery. * Own and optimise SIEM operations, detection engineering, and alert triage models. * Design and refine SOC shift structures, escalation frameworks, and...
- ...response activities, including containment, eradication, and recovery, adhering to established procedures and best practices. • Utilize, SIEM tools and log analysis techniques to identify and investigate potential security threats and vulnerabilities. • Manage and...
- ...technical and commercial teams. Nice to Have Background in Exposure Management / ASM / CTEM, SOC tooling, threat intelligence, XDR/SIEM, or adjacent categories. Experience building competitive programs (battlecards, win themes, structured win/loss). Experience...
- ...Hardware (state OEMs and relevant details), Cisco Switching and Routing experience, Cisco Wireless Controller experience McAfee - SIEM (ESM, MCE, ERC, ELM), ArcSight - SIEM (ESM, Connectors, Log Manager, SOAR, ArcMC), Splunk - SIEM Microsoft SCCM - Patch...