To proactively identify, analyze, and mitigate any cyber threats to flydubai’s digital assets by collaborating with Security Operation Center (SOC), Managed Services Partners, and Dubai Electronic Security Center (DESC) teams to develop analytical methods for detecting advanced and complex cyber threats targeting flydubai IT systems.
Position | Specialist – Cyber Security | |
Location | Dubai United Arab Emirates | |
Code | 24000383 | |
Closing Date | Aug 1st, 2024 | |
Responsibilities | Details | |
Threat Hunting | Develops and executes advanced threat hunting hypotheses based on diverse sources, including threat intelligence and security alerts. | |
Threat Intelligence | Reviews and analyzes threat intelligence data and indicators of compromise (IOCs) to proactively detect emerging threats. | |
Tools and Techniques | Utilizes a variety of tools and techniques, such as network analysis, endpoint forensics, malware analysis, log analysis, and data analytics, to hunt for and investigate potential threats. | |
Coordination | Coordinates and collaborates with other security teams, such as incident response, threat intelligence, vulnerability management, and security operations, to share threat hunting insights and best practices. | |
Documentation and Communication | Documents and communicates findings, recommendations, and remediation actions resulting from threat hunting activities to relevant stakeholders. | |
Methodology Improvement | Ensures the continuous update and improvement of threat hunting methodologies, processes, and tools to enhance detection capabilities. | |
TTP Development | Develops and maintains tools, techniques, and procedures (TTPs) for effective threat hunting activities. | |
Offensive Security | Stays abreast of the latest cyber threats, trends, and technologies to inform and refine threat hunting practices. | |
Comprehensive Analysis | Conducts comprehensive analysis of system, network, and application logging to identify attack techniques at all stages of the cyber kill chain. |
Qualifications Required
Minimum Education Level | Bachelor’s Degree (3+ years) | |
Education Specific Requirement | Degree in Information or Cyber Security | |
Certifications | Certified Ethical Hacker (CEH) – GIAC Certified Incident Handler (GCIH) – GIAC Certified Forensics Analyst (GCFA) – Offensive Security Certified Professional (OSCP) |
Experience Required
Years with Qualifications | 12 years | |
Professional Experience | 8+ years of experience in a technical role in the areas of Security Operation, Incident Response, Detection Engineering, Offensive Security/Red Teaming, or Cyber Threat Intelligence. – Direct experience performing threat hunting in a corporate environment using Structured (hypothesis & data driven) & Unstructured (intuitive & exploratory) hunting methodologies. – Experience analyzing system, network, and application logging for attack techniques at all stages of the cyber kill chain. – Familiarity with offensive security strategies and assessment methodology. – Previous experience performing digital forensics or incident response on major security incidents. – Experience working with very large datasets and log analysis tools including but not limited to: Splunk, Python, Pandas, SQL, Hadoop, Hue. – Experience in consuming and analyzing Cyber Threat Intelligence for actionable takeaways. |
Systems Knowledge
Proficient in | Microsoft Office |
Added Advantage | Experience with any ERP systems such as Oracle or SAP |
Core Competencies | |
Customer Focus | Teamwork |
Effective Communication | Resilience and Flexibility |
Personal Accountability & Commitment |
ISR Requirements
Reads and complies with the ISR policies of the Company and diligently reports any weakness or incidents to the respective Line Manager or the Information Security team. Completes all required ISR awareness sessions and follows associated guidelines in the day-to-day business operations.
Last Date : Aug 1st, 2024 |