Proactively identify gaps to detect potential intrusion attempts, data exfiltration, and lateral movement.
Seek out indicators of compromise and update security devices such as Firewalls, Web Application Firewalls, Email Gateway, SIEM, etc.
Develop custom detection rules & queries to identify threats in Cloud IaaS, PaaS, API abuse, and On-prem environments.
Work in coordination with the Security Operation Center to monitor security logs of all technology assets to detect anomalies and threats. Address cloud-specific attack vectors such as identities, insecure APIs, and data exposure due to misconfigured storage services.
Implement & maintain container security (DevSecOps) monitoring solutions to ensure the integrity & security of containerized applications running in a cloud environment.
Utilize API security tools to monitor & protect cloud APIs from abuse, unauthorized access, and injection attacks.
Investigate incidents and review security logs of critical business applications & infrastructure on a regular basis.
Assess the current security state and provide actionable recommendations to strengthen the environment of Aldar & Group subsidiaries' technology landscape.
Identify & report security incidents promptly. Follow up with IT Admins on the status of security incidents raised by the Security Operation Center (SOC). Coordinate with the Security Operation Center team and IT Administrators to resolve identified security incidents promptly.
Collate security incidents data & prepare Information Security Dashboard on a regular basis.
Continuously review and enhance cloud & on-prem monitoring strategies, considering the emerging threat landscape and cloud environment changes.
Keep up-to-date with the latest IT security threats and enrich security tools with the latest UAE / MENA region-specific threat intel.
Qualification And Experience
RELATED YEAR OF EXPERIENCE:
Min of: 5 years of experience in Security Assessments.
Technical And Interpersonal Skills
Strong communication and interpersonal skills.
Knowledge of Information Security Standards/Practices and regulatory/compliance requirements.
Technical proficiency in security-related hardware and software.
QUALIFICATION
Bachelor’s degree in computer science or a technical discipline relevant to IT Security.
One or more relevant security certifications preferred – Microsoft Azure Security Technologies Associate (AZ-500), Certified Kubernetes Security Specialist (CKS), CompTIA Cloud+ (CCSP+), (ISC)2 CCSP.
KEY RESULT AREAS
# of incidents identified & closed.
Security Breaches (# of intrusions resolved & prevented per year).