Home Jobs in Qatar Jobs in Doha Security Analyst Jobs in Doha Security Analyst

Cyber Security Threat Analyst -Qatar

Diyar United Company

Posted on June 3, 2019

5 - 10 years $5,001 - $8,000 Doha - Qatar

Bachelor of Science, Bachelor of Technology/Engineering, Bachelors in Computer Application(Computers). Any Nationality

Opening 01

Job Description

EMAIL JOB
Email sent successfully.

A. Cyber Security Responsibilities:
• Understand basic concepts such as networking, applications, and operating system functionality and be able to collaborate with other analysts to investigate security events, contextualize them with available intelligence, and identify potential threats.
• Transform event information and raw data into compromise reporting, acting to identify and halt active intrusions. Understand the operational security controls needed to detect, re-mediate, and prevent compromises. Candidates will need to apply their forensics, log analysis, and malware triage skills to solve complex intrusion cases.
• Maintain a strong understanding of network protocols, security appliances, and the data that traverses both.
• Responsible for Functional knowledge of host based forensic artifacts in as many operating systems; Windows, Linux, Mac OS.
• Consolidate technical artifacts and indicators into meaningful scale, impact, and remediation guidance.
• Analyze creatively and dynamically an ever-changing threat landscape by connecting disparate events into overarching incidents that may represent a larger threat than each individual event does alone.
• Responsible for Foundational knowledge of vulnerabilities, exploitation, lateral movement, command and control traffic, attacker methodologies, application whitelisting bypasses and legitimate service abuse.
• Responsible for Intelligence gathering, and updating of Threat intelligence data pipeline.
• Handle Independent threat analysis.
• Contribute to threat alerts & advisories.
• Responsible for development of internal systems & tools
• Foundational knowledge of vulnerabilities, exploitation, lateral movement, command and control traffic, attacker methodologies, application white-listing bypasses and legitimate service abuse.


B. Cyber Security Qualifications:
• The ability to analyze event and systems logs, perform forensic analysis, analyze malware, and other incident response related data, as needed.
• Deep understanding of incident response best practices and processes
• Familiarity with intrusion detection systems (e.g., snort) and tools (e.g., tcpdump, Wireshark).
• Knowledge of attack vectors, threat tactics and attacker techniques.
• Familiarity with network architecture and security infrastructure placement.
• Understanding of Windows operating systems and command line tools.
• A solid foundation in networking fundamentals, with a deep understanding of TCP/IP and other core protocols.
• Knowledge of network-based services and client/server applications.
• Proficient in multiple compiled and scripting programming languages (Shell, Perl, Python, Java, C++, Mozilla Rust, JavaScript)
• Proficient in TCP/IP networking and security.
• Good knowledge of vulnerability analysis, information warfare, Botnet analysis and Botnet propagation techniques.
• In-depth understanding of TCP/IP, DHCP, DNS, IPSEC, RPC, SMB, SSI-I, SIP, SMTP,IMAP, IRC, HTTP/S, FastFlux, Nettlow, SNMP, syslog
• Basic understanding of Google Apps APIs (maps, charts)
• Good Knowledge of Log Analysis
• Good Knowledge in Apache Kafka, Mesos, Docker, Elastic search and Apache Storm
• Good Knowledge of Open Source Intelligence & information gathering.
• Technical Writing.

C. Cyber Security Certifications:
GCIH, GCIA, GCFA Certificates, If any available

D. Nationality: For Arab Nationals – Algerian – Moroccans –East-West Europe – South Africans or any other nationality based at Qatar / residency transferable


IT - Software Services

IT Software

Desired Candidate Profile

A. Cyber Security Responsibilities:
• Understand basic concepts such as networking, applications, and operating system functionality and be able to collaborate with other analysts to investigate security events, contextualize them with available intelligence, and identify potential threats.
• Transform event information and raw data into compromise reporting, acting to identify and halt active intrusions. Understand the operational security controls needed to detect, re-mediate, and prevent compromises. Candidates will need to apply their forensics, log analysis, and malware triage skills to solve complex intrusion cases.
• Maintain a strong understanding of network protocols, security appliances, and the data that traverses both.
• Responsible for Functional knowledge of host based forensic artifacts in as many operating systems; Windows, Linux, Mac OS.
• Consolidate technical artifacts and indicators into meaningful scale, impact, and remediation guidance.
• Analyze creatively and dynamically an ever-changing threat landscape by connecting disparate events into overarching incidents that may represent a larger threat than each individual event does alone.
• Responsible for Foundational knowledge of vulnerabilities, exploitation, lateral movement, command and control traffic, attacker methodologies, application whitelisting bypasses and legitimate service abuse.
• Responsible for Intelligence gathering, and updating of Threat intelligence data pipeline.
• Handle Independent threat analysis.
• Contribute to threat alerts & advisories.
• Responsible for development of internal systems & tools
• Foundational knowledge of vulnerabilities, exploitation, lateral movement, command and control traffic, attacker methodologies, application white-listing bypasses and legitimate service abuse.


B. Cyber Security Qualifications:
• The ability to analyze event and systems logs, perform forensic analysis, analyze malware, and other incident response related data, as needed.
• Deep understanding of incident response best practices and processes
• Familiarity with intrusion detection systems (e.g., snort) and tools (e.g., tcpdump, Wireshark).
• Knowledge of attack vectors, threat tactics and attacker techniques.
• Familiarity with network architecture and security infrastructure placement.
• Understanding of Windows operating systems and command line tools.
• A solid foundation in networking fundamentals, with a deep understanding of TCP/IP and other core protocols.
• Knowledge of network-based services and client/server applications.
• Proficient in multiple compiled and scripting programming languages (Shell, Perl, Python, Java, C++, Mozilla Rust, JavaScript)
• Proficient in TCP/IP networking and security.
• Good knowledge of vulnerability analysis, information warfare, Botnet analysis and Botnet propagation techniques.
• In-depth understanding of TCP/IP, DHCP, DNS, IPSEC, RPC, SMB, SSI-I, SIP, SMTP,IMAP, IRC, HTTP/S, FastFlux, Nettlow, SNMP, syslog
• Basic understanding of Google Apps APIs (maps, charts)
• Good Knowledge of Log Analysis
• Good Knowledge in Apache Kafka, Mesos, Docker, Elastic search and Apache Storm
• Good Knowledge of Open Source Intelligence & information gathering.
• Technical Writing.

C. Cyber Security Certifications:
GCIH, GCIA, GCFA Certificates, If any available

D. Nationality: For Arab Nationals – Algerian – Moroccans –East- West Europe – South Africans or any other nationality based at Qatar / residency transferable

Keywords

SIEM Cyber Security Network Security TCP/IP Vulnerability Assessment Log Analysis Networking Protocols Malware Analysis Incident Management Antivirus Cyber Forensics Windows OS

Easy Apply

REPORT THIS JOB

Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information.We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at abuse@naukrigulf.com

Diyar United Company

Established in 1980, Diyar United Company has been, since more than thirty years, managing large and complex technology projects. Its high caliber and professional work force of 900+ employees, its strategic alliances with leading technology companies, its focus on meeting client business objectives , its investment in technology initiatives that help the economy and society and its commitment to Total Quality Management make Diyar an ideal partner for our client technology requirements through its partnership with IBM, Dell, HP, SUN, Cisco, Microsoft, Oracle and VERITAS etc

DUC is the largest IT Company in Kuwait providing outsourcing services. Our experience in outsourcing varies from strategic thinking, project management, business analysis and developing integrated service models suitable for any complex environment to ensure that the services are provided efficiently, professionally and within the service levels. The unique breadth of our outsourcing portfolio extends not just to technology, but also to internationally recognized process standards as a part of adopting the ITIL best practices
More
View Contact Details

Contact

Name/ Designation:
Nagwa Qotb - Resource Support Manager

Additional Information Required

Employer has requested some additional information along with your application for this job

Login to Naukrigulf

Continue using

All your activity will remain private

or