Get new jobs by email
- ...organization's infrastructure. The role operates enterprise-grade vulnerability management platforms (Tenable and Qualys), integrates with SIEM solutions such as Splunk, and works closely with SOC, IT Infrastructure, and risk teams to maintain a strong security posture. 3....
- ...infrastructure. This role requires proficiency in vulnerability management tools such as Tenable and Qualys, with an emphasis on experience with SIEM technologies like Splunk. The ideal candidate will have 3–4 years of experience in the field and relevant certifications. This...
- ...integrity of data across multi-cloud environments. The ideal candidate will have a Bachelor's degree in IT or Cybersecurity, relevant SIEM certifications, and 3–5 years of hands-on experience in security engineering. Strong skills in Google SecOps, Python, and cloud...
- ...oversee centralized security log management functions. The ideal candidate will have 5+ years of experience in IT Security, expertise in SIEM technologies, and a Bachelor's degree in Information Security or a related field. Responsibilities include managing IT and OT Cyber...
- ...threat intelligence frameworks (MITRE ATT&CK, Diamond Model, Kill Chain). ~ Experience with threat intelligence platforms (TIPs), SIEM, and threat hunting tools. ~ Familiarity with malware analysis, reverse engineering, and digital forensics. ~ Prior experience in...
- ...successful candidate will also contribute to the broader security architecture, integrating MIP capabilities with technologies such as SIEM, CSPM, and CASB to deliver comprehensive data visibility and protection. Primary Job Responsibilities & Accountabilities:...
- ...used by Security Operations Center; including configuration management and system updates. · Ensuring the overall health of the SIEM system, ticketing system, and other SOC technology components. · Manage verification, validation, tuning, health and collection...
- ...analytic methods for detecting threats. · Proactively monitoring the operating systems alert queue using multiple tools, such as SIEM, EDR and custom-built system monitoring tools. · Conducting triage of alerts to identify potential, false positives, policy...
- ...necessary to escalate to Tier 2 Analyst. · Continuously monitoring the operating systems alert queue using multiple tools, such as SIEM, EDR and custom-built system monitoring tools. · Continuously monitors health of operating systems security sensors. ·...
$24500 per hour
...: Security Operations Analyst (SC-200) OSCP (Offensive Security Certified Professional) Skillset: • Hands-on expertise in SIEM, XDR/EDR, NDR, SOAR, vulnerability management, and cloud security monitoring. • Strong understanding of MITRE ATT&CK, threat hunting...- ...Lead SOC analyst teams / member's activities Monitor and analyse Advanced Threat events, Security Incident and Event Management (SIEM) toolsets and event logs to identify security indicator of compromise, attacks and threats for remediation and / or suppression Assist...
- ...setups, SPF/DMARC/DKIM) Patch management (WSUS, SCCM, or third-party tools) Experience integrating systems with an on-premises SIEM solution Familiarity with MITRE ATT&CK and common attack vectors Requirements Qualifications: ~ Bachelor’s degree in information...
- ...engineering and big-data platforms (data pipelines, stream processing, data lakes). · Knowledge of security telemetry including SIEM data models, NetFlow/IPFIX, EDR telemetry and threat intelligence formats. · Knowledge of machine learning and analytics...
- ...Investigate security incidents and provide advanced technical support for detection and response. - Perform real-time monitoring across SIEM, XDR/EDR, NDR, OT, and cloud security platforms. - Conduct root cause analysis (RCA) and document lessons learned. -...
- ...Purpose of the Job Responsible for managing QatarEnergy IT and OT / Industrial Cyber Security centralized security log management (SIEM-Security Information Event Management/ SOAR, EDR other SOC platforms) functions. Use variety of tools to analyse and investigate...
- ...principles, including threat analysis and risk management. ~ Experience with threat intelligence tools and technologies, such as SIEM systems and IDS/IPS solutions. ~ Excellent analytical and problem‑solving skills, with the ability to think critically and make sound...
- ..., and cloud network connectivity. Architect and manage security solutions including firewalls, IDS/IPS, WAF, DLP, EDR/XDR, and SIEM. Ensure secure network access through IAM, NAC, VPN, and Zero Trust principles. Drive security incident response, root cause...
- ...Cybersecurity capabilities through the adoption of ISA/IEC 62443 standards and supporting tools (e.g., vulnerability assessment, IPS, SIEM, etc.). Key Accountabilities: Routine Duties: Establish a comprehensive cybersecurity management system and framework...
- ...environment. # Monitor network traffic, security systems, and logs for anomalies or suspicious activities using advanced tools like SIEM. # Respond to security incidents, investigate breaches, and provide timely resolutions to minimize disruption to services....
- ...Management, Intrusion Detection/Protection, Perimeter Security, Security Incident Management, Security Information and Event Management (SIEM), Penetration Testing (application, network, host, social). ~ Strong understanding and experience combatting crime‑ware or APT...
- ...through continuous monitoring, optimization, and proactive capacity planning. Integrate network telemetry and logs into enterprise SIEM platforms to support threat detection, visibility, and response. Collaborate with DevOps, Cloud, and Infrastructure teams to...
- ...Unified Data Model (UDM). Data Health Monitoring: Build dashboards to monitor ingestion rates, latency, and data drops to ensure the SIEM is always receiving high-quality, actionable data. SOAR & Automation Engineering Playbook Development: Design and code...
- ..., and implementing controls to protect systems, networks, and data. Responsibilities Monitor and analyze security alerts from SIEM, EDR, and other security tools. Investigate and respond to security incidents such as malware infections, phishing attacks, and unauthorized...
$600 per year
...security incident investigations, providing technical analysis and remediation guidance* Standardize automation and orchestration across SIEM, SOAR, EDR and related tools* Ensure alignment of security operations with security policies and frameworks (ISO 27001, NIST, MITRE...- ...recovery, and root cause analysis. Conduct threat hunting by analyzing logs, network traffic, and endpoint behavior. Fine-tune SIEM use cases, detection rules, and alerts to improve threat visibility. Coordinate with IT, network, application, and cloud teams...
- ...monitor Cisco routers, switches, and security devices Analyze logs from firewalls, IDS/IPS, VPNs, and network devices Support SIEM integration of Cisco network and security logs Perform packet analysis using tools like Wireshark and tcpdump Implement and maintain...
- .... The ideal candidate has over 5 years of experience in Information Security, strong incident response skills, and familiarity with SIEM/SOAR tools. The position offers a long-term contract, competitive compensation, and a vacation policy in line with Qatar's calendar....
- ...Perform advanced incident investigation, triage, and response across IT and OT environments Conduct proactive threat hunting using SIEM/XDR platforms Manage and remediate vulnerabilities using Qualys or Tenable Correlate alerts and telemetry within Microsoft...
