
SOC Analyst - OT Security
cander -
Dubai, United Arab EmiratesJob Details
Experience Needed:
Career Level:
Education Level:
Salary:
Job Categories:
Skills And Tools:
Job Description
Job Summary
We are looking for a skilled SOC Analyst with a strong background in OT Security and at least 5 years of experience in a Security Operations Center.
The ideal candidate will possess hands-on expertise in incident response, security event triage, and be proficient in SIEM platforms such as Splunk, QRadar, or Azure Sentinel.
Key responsibilities include real-time monitoring and investigating security incidents, analyzing alerts to identify threats, and collaborating with OT security teams.
Candidates should have excellent analytical skills, the ability to work under pressure, and ideally hold relevant certifications.
Responsibilities
Perform real-time monitoring, detection, and triaging of security events from SIEM and other security tools.
Investigate and respond to security incidents in accordance with incident response playbooks.
Analyse alerts, logs, and telemetry data to identify malicious activity and potential threats.
Provide initial containment and escalation to L2/L3 teams as needed.
Collaborate with OT security teams to identify, analyse, and mitigate threats within industrial environments.
Document incident investigations and contribute to improving SOC operational procedures.
Ensure alignment with security best practices and compliance requirements.
GCIA
GCIH
Splunk Certified
We are looking for a skilled SOC Analyst with a strong background in OT Security and at least 5 years of experience in a Security Operations Center.
The ideal candidate will possess hands-on expertise in incident response, security event triage, and be proficient in SIEM platforms such as Splunk, QRadar, or Azure Sentinel.
Key responsibilities include real-time monitoring and investigating security incidents, analyzing alerts to identify threats, and collaborating with OT security teams.
Candidates should have excellent analytical skills, the ability to work under pressure, and ideally hold relevant certifications.
Responsibilities
Perform real-time monitoring, detection, and triaging of security events from SIEM and other security tools.
Investigate and respond to security incidents in accordance with incident response playbooks.
Analyse alerts, logs, and telemetry data to identify malicious activity and potential threats.
Provide initial containment and escalation to L2/L3 teams as needed.
Collaborate with OT security teams to identify, analyse, and mitigate threats within industrial environments.
Document incident investigations and contribute to improving SOC operational procedures.
Ensure alignment with security best practices and compliance requirements.
GCIA
GCIH
Splunk Certified
Job Requirements
Qualifications
"Senior SOC Analyst with 5+ years"
"Bachelor's Degree in Computer Science, Information Technology, or a related field"
"Senior SOC Analyst with 5+ years"
"Bachelor's Degree in Computer Science, Information Technology, or a related field"