Send me Jobs like this
Experience
3 - 7 Years
Job Location
Education
Masters in Computer Application(Computers)
Nationality
Any Nationality
Gender
Any
Vacancy
1 Vacancy
Job Description
Roles & Responsibilities
Manage network, intrusion detection and prevention systems.
Conduct periodic compromise assessments across selected networks and propose recommendations based on assessment results.
Conduct physical security assessment of the organization’s systems, including servers and networks, ensuring that any unauthorized external physical interference is not actually possible.
Conduct ongoing network hunt activities.
Conduct proactive vulnerability assessment across the network, subnetworks and service traffic to identify potential points of intrusion.
Research and develop methods of tracking and detecting malicious activity within a network.
Develop tools, signatures, and methods of detection for use in incident response activities.
Develop SIEM integrations, dashboards, and analytics to illuminate and visualize threat activity.
Analyze network traffic to provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
Uses data collected from a variety of cyber defense tools (e.g., anti-virus, IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments, perform cyber defense trend analysis and reporting, and perform event correlation to mitigate threats and gain situational awareness and determine the effectiveness of an observed attack.
Carries out triage to ensure that a genuine security incident is occurring.
Coordinate with entity-wide cyber defense staff to validate network alerts.
Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan.
Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
Provide daily summary reports of network events and activity relevant to cyber defense practices.
Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.
Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools.
Isolate and remove malware.
Develop content for cyber defense tools use them for continual monitoring and analysis of network activity to identify malicious activity.
Assist in the construction of signatures which can be implemented on cyber defense tools in response to new or observed threats within the network environment.
Analyze and report organizational security posture trends.
Desired Candidate Profile
Knowledge
Security concepts such as cyber-attacks and techniques, threat vectors, risk and threat management, incident management etc.
Networking concepts and protocols, and network security attacks, vulnerabilities, processes, methodologies, access control mechanisms, traffic analysis methods.
Cyber threats and vulnerabilities and information dissemination sources (e.g., alerts and advisories).
Cyber defense and vulnerability assessment tools and their capabilities.
System and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
Scripting languages (e.g., Python, Perl, Bash) used in an incident response environment
Incident response and handling methodologies.
Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools, applications, methodologies and techniques for detecting host and network-based intrusions.
Threat investigations, reporting and investigative tools.
Cyber defense and information security policies, procedures, and regulations.
Common attack vectors, the different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks) and attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
Cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored), and attackers’ methodologies.
Signature implementation impact for viruses, malware, and attacks.
Windows/Unix ports and services.
Relevant laws, legal authorities, restrictions, and regulations pertaining to cyber defense activities.
Packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).
Use of sub-netting tools.
Penetration testing principles, tools, and techniques.
Investigation, auditing and forensics methods, processes, procedures and standards.
Different types of hardware, storage, imaging and file system analysis.
Data backup and recovery.
Education and CertificationBachelor’s degree in an information technology, computer science, cyber security or equivalent work experience.
CompTIA Security+
CISSP: Certified Information Systems Security Professional
GCFA: GIAC Certified Forensic Analyst
GCIH: GIAC Certified Incident Handler
GCIA: GIAC Certified Intrusion Analyst
OSCP: Offensive Security Certified Professional
CEH: Certified Ethical Hacker
CPT: Certified Penetration Tester
Experience
3 years of experience in cyber security operations with expertise in managing the Security Operations Center
UAE experience preferred.
Employment Type
- Full Time
Company Industry
- Medical
- Healthcare
- Diagnostics
- Medical Devices
Department / Functional Area
- IT Software
Keywords
- Cybersecurity Specialist
- Network Security Engineer
- Information Security Analyst
- Threat Intelligence Analyst
- Risk Assessment
- Network Security
- IT Security Consultant
- Cybersecurity
Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at abuse@naukrigulf.com
NMC healthcare LLC
NMC is a diversified business conglomerate. One of the focus areas being Healthcare, with Specialty Hospitals, Medical centres and Clinics across the UAE.