Skip to main content

13096 - SOC Analysts/Incident Responder

Posted: 14 Nov, 2022
Location: Abu Dhabi, United Arab Emirates
Experience: 7 - 10 Yrs

Job Description

 SOC Analysts/Incident Responder

Work location : Abu Dhabi




Core Tasks:

1.Incident response:

  • Collect intrusion artifacts (e.g., source code, malware, trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise. 
  • Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents. 
  • Coordinate incident response functions.
  • Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat conditions and determine which security issues may have an impact on the enterprise. (T0503)
  • Perform cyber defense trend analysis and reporting.
  • Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems. 
  • Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts. 
  • Write and publish after-action reviews
  • Write and publish cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies. 

2-SOC ANALYSIS:

  • Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities
  • Use cyber defense tools for continual monitoring and analysis of system to identify malicious activity. 
  • Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment. 
  • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. 
  • Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack. 
  • Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings). 
  • Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts. 
  • Perform cyber defense trend analysis and reporting. 
  • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. 
  • Coordinate with enterprise-wide cyber defense staff to validate network alerts. 
  • Identify and analyze anomalies in network traffic using metadata. 
  • Provide daily summary reports of network events and activity relevant to cyber defense practices. 
  • Identify applications and operating systems of a network device based on network traffic.


Core Competencies
  1. Business Continuity
  2. Computer Forensics
  3. Computer Network Defense
  4. Incident Management
  5. Information Systems/Network Security
  6. Infrastructure Design
  7. System Administration
  8. Threat Analysis
  9. Vulnerability Assessment
  10. Security Operations


Qualifications & Experience
  • Bachelor of Computer Science or Information Technology or Equivalent
  • 5 years’ experience as SOC Analysts/Incident Responder in an organization of similar size
  • Certificates in SOC analysis and/or incident response
  • Experience with Logarithm or Microsoft Sentinel 


Core Knowledge, Skills, Abilities (KSAs)
  • Knowledge of business continuity and disaster recovery continuity of operations plans. 
  • Skill in preserving evidence integrity according to standard operating procedures or national standards. 
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
  • Knowledge of cyber defense and information security policies, procedures, and regulations. 
  • Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters). 
  • Knowledge of incident categories, incident responses, and timelines for responses. 
  • Knowledge of incident response and handling methodologies. 
  • Skill in performing damage assessments. 
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). 
  • Skill in securing network communications. 
  • Skill in using security event correlation tools. 
  • Knowledge of network services and protocols interactions that provide network communications. 
  • Knowledge of OSI model and underlying network protocols (e.g., TCP/IP). 
  • Knowledge of cloud service models and how those models can limit incident response. 
  • Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. 
  • Knowledge of system administration, network, and operating system hardening techniques. 
  • Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). 
  • Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state-sponsored, and nation sponsored). 
  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). 
  • Knowledge of malware analysis concepts and methodologies. 
  • Skill of identifying, capturing, containing, and reporting malware.
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). 
  • Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities. 
  • Skill in recognizing and categorizing types of vulnerabilities and associated attacks. 
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
  • Knowledge of the common attack vectors on the network layer.


Required Skills

Skill Years Months
SOC Analysts 10 0
Incident Responder 10 0
Logarithm 7 0
Microsoft Sentinel 7 0
Business continuity 10 0
Computer Forensics 10 0
Information Systems/Network Security 10 0
Infrastructure Design 10 0
System Administration 10 0
Security Operations 10 0