JobsAisle
I

Security Operation Center Analyst

IFZA Dubai

Dubai, UAEAED 6,000-15,000/moToday
UAEIT & TechnologyFull Time

Job Description

Dubai, United Arab Emirates | Posted on 06/03/2026IFZA Dubai is the most dynamic and truly international Free Zone Community in the UAE, optimizing the country's strategic location and world-class infrastructure. We provide easy, reliable, and fast company formation services through our network of Professional Partners and Government Authorities.Job DescriptionThe SOC Analyst will be responsible for protecting IFZA's information systems by identifying, assessing and mitigating security risks. This role involves monitoring, analyzing, and responding to security incidents, implementing security measures, and ensuring compliance with industry standards and regulations. The ideal candidate is proactive, detail-oriented, and possesses strong technical and analytical skills.ResponsibilitiesSecurity MonitoringMonitor SIEM dashboards (e.g., Microsoft Sentinel) and security alerts in real time.Track and analyze events from security tools (e.g., Microsoft Defender).Identify suspicious activities, anomalies, or policy violations.Perform initial investigation and classification of alerts (false positive vs true positive).Collect and review logs, event details, reputation information, and indicators of compromise.Escalate confirmed or high‑severity incidents to L2/L3 analysts with proper documentation.Initiate predefined response actions (isolating devices, forcing password resets, blocking IPs).Threat AnalysisCheck IOC hits against threat intelligence sources.Analyze phishing emails, malware infections, malicious URLs, attachments, credential‑harvesting attempts and unauthorized access.Identify trends across alerts to support early‑stage threat detection.Documentation & ReportingCreate detailed incident tickets and investigation notes.Conduct root‑cause analysis and document incident reports with remediation recommendations.Maintain proper incident timelines and updates in the ticketing system.Generate reports for repeated or trending issues.Work closely with the Security Team and internal IT teams.Communicate effectively with users to validate suspicious activities or login attempts.Follow established SOPs and contribute to process improvements.Create and distribute educational materials on emerging cyber threats.Threat Intelligence & ResearchStay updated on the latest cyber threats, vulnerabilities, and attack vectors.Required QualificationsBachelor's in Engineering, Computer Science, or related field.5‑7 years of experience in SOC operations.Minimum 3+ years of hands‑on experience in SOC, blue team, or security engineering roles.Proven expertise with Microsoft Sentinel, Microsoft Defender, incident management, and compromised recovery.Technical SkillsFamiliarity with MITRE ATT&CK mapping and threat‑hunting methodology.Benefits24 annual leave days.Medical insurance plan (option to upgrade at your own cost).Invitations to participate in company functions, staff events, and department team‑building events.Opportunities to learn, develop and grow with the organization.#J-18808-Ljbffr