| Job Location | United Arab Emirates |
| Education | Graduate; Post Graduate; Engineering Graduates/PG |
| Salary | Not Mentioned |
| Industry | IT - Software |
| Functional Area | Not Mentioned |
JOB PURPOSE:To protect the organization’s IT infrastructure by actively monitoring, analyzing, and responding to security incidents and threats. The Technical Specialist - Cyber Security plays a key role in implementing cybersecurity controls, managing security tools, and ensuring compliance with industry standards and regulatory frameworks.CERTIFICATIONS:CISSP, CISM, CISA, CompTIA Security+ or equivalentCisco CCNA Security or similar, CEH, GIAC, Microsoft SC-200AI-related training or certification will be considered an added advantage.EXPERIENCE:Minimum 8-10 years of hands-on experience in cybersecurity operations, SOC & NOC environments, and security infrastructure managementRESPONSIBILITIES (INCLUDES ALL TASKS):The Technical Specialist - Cyber Security is responsible for monitoring, analyzing, and responding to security incidents using SIEM and other security tools. They play a critical role in maintaining endpoint and network security, managing access controls, supporting vulnerability and patch management, and ensuring compliance with ISO 27001 and other standards. The role includes regular system hardening, firmware updates, configuration backups, and documentation. The engineer also assists with audit readiness, contributes to threat hunting, and collaborates with internal teams to maintain a secure IT environment.Key Responsibilities:· Perform triage and investigation of security events and escalate to infosec lead when needed.· Conduct daily health checks on firewalls, endpoints, security appliances, and SIEM systems.· Support and manage endpoint protection platforms, email security, and web filtering systems.· Participate in threat hunting activities and analyse suspicious activities or anomalies.· Coordinate and support vulnerability assessments and ensure timely patch compliance.· Maintain system hardening, secure configurations, and adhere to CIS benchmark standards.· Ensure security controls and processes align with ISO 27001, NIST, and other relevant frameworks.· Assist in preparing and participating in internal and external ISO audits.· Prepare and maintain accurate and up-to-date security process and documentation, audit logs, SOPs, and reports.· Perform regular configuration backups and firmware updates for security infrastructure.· Administer and maintain IAM, MFA, and PAM systems to ensure secure access controls.· Collaborate with infrastructure and application teams to support secure system operations.· Respond to audit findings, implement remediation steps, and ensure closure of compliance gaps.· Contribute to security awareness by documenting incidents, lessons learned, and procedures.· Participate in 24/7 on-call rotation or scheduled maintenance windows when required.Required Skills and Experience:Strong understanding of network security technologies:Firewalls: Palo Alto, Fortigate, Cisco ASA/FTDVPN technologies and Network Access Control (NAC)Hands-on experience with security operations:SIEM tools for monitoring, log analysis, and threat detectionIncident response and escalation handlingWAF – F5 ASM, BaracudaEndpoint security management:Tools such as CrowdStrike, Microsoft Defender, SentinelOneDLP: ForcepointIdentity and Access Management (IAM):Multi-Factor Authentication (MFA)Privileged Access Management (PAM) – CyberArkVulnerability management:Tools such as Nessus, QualysPatch management processesFamiliarity with:ISO 27001, NIST, GDPR, PCI-DSS and other security compliance standardsExperience with:Email security gateways: Proofpoint, Mimecast, Cisco-ESAWeb proxies: Forcepoint, Zscaler, Cisco-WSASecurity hardening and secure configuration practices:CIS benchmarks, system hardening techniquesProficiency in security monitoring and analysis tools:SIEM platforms (e.g., Splunk, QRadar, SolarWinds SEM)SOAR platforms (optional but beneficial)Compliance and security governance:Familiarity with ISO 27001, PCI-DSS, NIST, GDPR standardsInvolvement in ISO audits, audit readiness, and compliance documentationResponsible for conducting periodic reviews of all infrastructure componentsResponsible for conducting vulnerability assessments and penetration testing scans, as well as coordinating remediation efforts with relevant teams to mitigate identified risks.TECHNICAL SKILLS /COMPETENCIES:MANDATORY· Experience working with enterprise firewalls such as Palo Alto, FortiGate, Cisco ASA/FTD· Strong hands-on knowledge of SIEM tools (e.g., Splunk, QRadar, SolarWinds SEM) for log monitoring and threat detection· Exposure to endpoint protection platforms such as CrowdStrike, Sentinel One, or Microsoft Defender, Forcepoint DLP· Hands-on experience with VPN, NAC, and network security policies· Hands-on experience with WAF – F5 ASM, Barracuda· Working knowledge of Vulnerability Management tools like Nessus or Qualys· Proficiency in managing Identity and Access Management (IAM), including MFA and Privileged Access Management (PAM: CyberArk, Delinea [Centrify])· Practical experience with PCI-DSS, ISO 27001 audits, security documentation, and compliance reporting· Skills in security hardening and application of CIS benchmarks· Ability to perform firmware upgrades, backup configuration, and system maintenance· Hands-on experience on email security gateways (e.g., Proofpoint, Forcepoint, Cisco ESA, Mimecast)· Hands-on experience on Web proxy solutions (e.g., Forcepoint, Zscaler, Cisco WSA)OPTIONAL· Cloud security experience (Azure, AWS, or GCP):· Antivirus Symantec,· Cloud firewall configurations· IAM policies for cloud resources· Monitoring and logging in cloud environments· Basic scripting and automation for SIEM/SOAR workflows· Experience in hybrid or multi-cloud security implementations· Experience with AI-based implementation or support will be considered an added advantage.SOFT SKILLS:MANDATORY· Strong analytical and problem-solving ability· Excellent written, verbal communication, and presentation skills· Clear and accurate documentation skills· Proven experience in team leadership and collaboration, with the ability to work effectively across departments and foster a cooperative work environment.· High attention to detail and proactive security mindset
Keyskills :
F5 WAF Endpoint Security Vulnerability Management IAM ISO 27001
© 2023 HireeJobsGulf All Rights Reserved