Job Summary
Creation of USE cases using MITRE framework, Dashboard and Reports on Splunk SIEM Strong technical background on Network Security, Threat hunting and Risk based analysis Analyzing Network traffic for IPS, WAF, Firewall, DDOS and other perimeter device. Key Accountabilities
Continuous monitoring and review of security events, reports, alerts and CSOC dashboards to identify anomalous patterns indicative of potential security incidents Responsible for timely and effective response to, and management of, incidents, events, notifications, calls and other activities related to CSOC including Root Cause Analysis Gather relevant information and provide actionable intelligence on potential cyber security threats and incidents Other Accountabilities
Take direction and guidance from InfoSec Management to build, support and update the CSOC playbooks / processes Render support for the administration and configuration of security controls such as SIEM, Anti-virus software, network security devices, PAM, DLP, Vulnerability Management, etc. Prepare security awareness messages, presentations and announcements for management, IT staff, and regular users Participate in regular cyber drills and CSOC exercises Competencies
Adaptability / Flexibility Computer Skills Creativity / Innovation Decision Making / Judgment Dependability Initiative Integrity / Ethics Internet Savvy Managing Technology Personal Organization Planning Problem Solving / Analysis Process PRIME postings manually Process transaction vouchers received from various Departments (internal) Productivity Quality Receipt and verify the posting and payroll documents received Results Focus Self Development Sense of Urgency Strategic Thinking / Management Summary Technical Skills Vision and Values Skills
Anomaly Detection Authentication Cryptography Cyber Crime Trend Analysis Cyber Security Administration Cyber Security Analysis Cyber Security Architecture Cyber Security Audits Cyber Security Best Practices Cyber Security Compliance Cyber Security Design Cyber Security Governance Cyber Security Monitoring Cyber Security Planning Cyber Security Policy Management Cyber Security Regulations Cyber Security Risk Management Cyber Security Standards and Procedures Cyber Security Testing Cyber Security Threat Monitoring Cyber Security Tools / Products Cyber Threats and Attacks Data Analysis Disaster Recovery Encryption and Authentication Encryption / Decryption Event Monitoring / Log Analysis Fault Diagnosis / Isolation / Detection Firewall Management Hacking Countermeasures Incident Response Incidents Reporting Intrusion Detection Intrusion Detection Systems Malware Analysis Network Forensics Network Protocols Network Topologies Penetration Testing Threat Containment Vulnerability Assessments Education
Bachelor’s degree in Computer Science or equivalent
#J-18808-Ljbffr
Security Analyst • Doha, Qatar