Home Jobs in Kuwait Jobs in Al Kuwait Security Analyst Jobs in Al Kuwait Security Analyst

Cyber Security Threat Intelligence Analyst

Diyar United Company

Posted on October 29, 2019

3 - 5 years $2,000 - $3,000 Al Kuwait - Kuwait

Bachelor of Education, Bachelor of Science(Computers), Bachelor of Technology/Engineering(Computers). Any Nationality

Easy Apply

Openings 02

Job Description

EMAIL JOB
Email sent successfully.

A. Accountabilities:

• Identify and investigate intrusion to determine the cause and extent of the breach, leveraging threat intelligence source.
• Identify threat actor group (APT) and their technique, tools, and process.
• Participate in Hunt mission using threat intelligence, analysis of anomalous log data and anomalous session to detect and eradicate threat actors.
• Develop Threat Hunting dashboard and report to identify potential threat, suspicious/anomalous activity, and malware.
• Identify malicious or anomalous activity based on event data from network flows, EDR and other source.
• Perform deep live analysis by correlating data from various sources
• Provide expert analytic investigative support for critical Incident Response security incident.
• Maintain proficiency with security standards, tools and practices.
• Responsible to produce comprehensive and accurate oral and written report and presentation for both technical and executive audience.
• Communicate and interface with client, both technically and strategically from the executive level, to client stakeholder and legal counsel
• Responsible to escalation support for client Incident Response team on critical security event

B. Qualifications:

• Strong background within Incident Response & Threat Hunting including IOC (Indicators of Compromise) & TTP (Tactics, Techniques & Procedures)
• Strong background in forensics, data collection and log triage
• Strong knowledge in TCP/IP, cryptographic protocols and algorithms, operating system (MAC\Linux\Windows) internal and operation.
• Understand of common Attack Vectors DDoS attacks, Phishing, Web Attacks, and Malware
• Experience in performing malware analysis
 
C. Accreditation/Certifications: 
• SANS GIAC (GCFA, GCIH) – Mandatory
• SANS GIAC (GREM, GCFE), OSCP – Not mandatory

D. Education / Qualifications: 
• Any relevant bachelor degree in computer science or any related technology background.

E. Experience:
• +3 years of experience in threat hunting and incident response


IT - Software Services

IT Software

Desired Candidate Profile

A. Accountabilities:

• Identify and investigate intrusion to determine the cause and extent of the breach, leveraging threat intelligence source.
• Identify threat actor group (APT) and their technique, tools, and process.
• Participate in Hunt mission using threat intelligence, analysis of anomalous log data and anomalous session to detect and eradicate threat actors.
• Develop Threat Hunting dashboard and report to identify potential threat, suspicious/anomalous activity, and malware.
• Identify malicious or anomalous activity based on event data from network flows, EDR and other source.
• Perform deep live analysis by correlating data from various sources
• Provide expert analytic investigative support for critical Incident Response security incident.
• Maintain proficiency with security standards, tools and practices.
• Responsible to produce comprehensive and accurate oral and written report and presentation for both technical and executive audience.
• Communicate and interface with client, both technically and strategically from the executive level, to client stakeholder and legal counsel
• Responsible to escalation support for client Incident Response team on critical security event

B. Qualifications:

• Strong background within Incident Response & Threat Hunting including IOC (Indicators of Compromise) & TTP (Tactics, Techniques & Procedures)
• Strong background in forensics, data collection and log triage
• Strong knowledge in TCP/IP, cryptographic protocols and algorithms, operating system (MAC\Linux\Windows) internal and operation.
• Understand of common Attack Vectors DDoS attacks, Phishing, Web Attacks, and Malware
• Experience in performing malware analysis
 
C. Accreditation/Certifications: 
• SANS GIAC (GCFA, GCIH) – Mandatory
• SANS GIAC (GREM, GCFE), OSCP – Not mandatory

D. Education / Qualifications: 
• Any relevant bachelor degree in computer science or any related technology background.

E. Experience:
• +3 years of experience in threat hunting and incident response

Keywords

Internet Protocol Suite (TCP/IP) Forensic Analysis TTP Malware Analysis Cyber Threat Hunting (CTH) Incident Response APT Cyber Threat Intelligence (CTI) Transmission Control Protocol (TCP) Algorithms DDoS attacks cryptographic protocols

Login To ApplyRegister & ApplyApply Without Registration

REPORT THIS JOB

Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information.We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at abuse@naukrigulf.com

Diyar United Company

Established in 1980, Diyar United Company has been, since more than thirty years, managing large and complex technology projects. Its high caliber and professional work force of 900+ employees, its strategic alliances with leading technology companies, its focus on meeting client business objectives , its investment in technology initiatives that help the economy and society and its commitment to Total Quality Management make Diyar an ideal partner for our client technology requirements through its partnership with IBM, Dell, HP, SUN, Cisco, Microsoft, Oracle and VERITAS etc

DUC is the largest IT Company in Kuwait providing outsourcing services. Our experience in outsourcing varies from strategic thinking, project management, business analysis and developing integrated service models suitable for any complex environment to ensure that the services are provided efficiently, professionally and within the service levels. The unique breadth of our outsourcing portfolio extends not just to technology, but also to internationally recognized process standards as a part of adopting the ITIL best practices
More
View Contact Details

Contact

Name/ Designation:
Nagwa Qotb - Resource Support Manager

Website https://www.diyarme.com


Additional Information Required

Employer has requested some additional information along with your application for this job

Login to Naukrigulf

Continue using

All your activity will remain private

or