Threat Defense Operations Manager Job Vacancy in UAE Abdu Dhabi
Holders of the Guinness World Record for the "Largest Fireworks Display" ever recorded and "Largest Pyrotechnic Image", Fireworks by Grucci is a sixth-generation, family-owned and operated company. Known as "America's First Family of Fireworks," the Gruccis have transformed the night skies to the delight of millions across the globe since 1850. They are world-renowned for pyrotechnic artistry, scientific innovation and old-fashioned values. Their signature performances include the official celebration of the 200th Anniversary of the National Anthem “Star Spangled Spectacular,†in Baltimore, countless performances in and around Las Vegas, NV., seven consecutive U.S. Presidential Inaugurations; the Olympic Games in Beijing, Salt Lake City, Los Angeles and Lake Placid; commemorations such as the Centennial of the Statue of Liberty and star-studded extravaganzas including the grand opening of the Atlantis Dubai and the Palm Jumeirah Island in the United Arab Emirates. On New Year’s Eve 2013, a stunning performance displaying 479,651 fireworks made its debut above Dubai’s iconic skyline. The Gruccis achieved their “Largest Fireworks Display†title with this performance and smashed the Guinness Book of World Record’s preceding mark. Phil Grucci currently serves as President/CEO of Fireworks by Grucci, Inc. and Pyrotechnique by Grucci, Inc., the manufacturing entity of the Grucci group of companies.... |
Key Metrics:
Number of cyber threat hunting activities completed on or before target dates.
Percentage of customized rules created.
Percentage of incidents not prevented due to SIEM misconfiguration.
Number of threat reports generated or reviewed.
Key Accountabilities of the Role:
Develop and maintain an understanding of current vulnerabilities and mitigation strategies in ADIB's cyber defense operations.
Collaborate with ITD to review alerts generated by detection infrastructure, focusing on false positive alerts.
Analyze threat information from various sources, including logs, Intrusion Detection Systems (IDS), and intelligence reports from Cyber Threat Intelligence.
Continuously analyze the security stack and gather log ingestion feedback to identify gaps and prioritize detection needs.
Identify and hunt for threat actor groups, their tools, techniques, procedures (TTPs), and Indicators of Compromise (IOCs) in collaboration with the information security team.
Create tailored detection logic based on the Group threat landscape, using industry-specific intelligence and developed use cases in the form of threat rules and signatures.
Work with ITD to add data sources and provide guidance on SIEM configuration.
Operationalize identified IOCs by testing and overseeing the deployment of SIEM monitoring and alerting rules.
Support Cyber Threat Intelligence and IS Risk Management teams by providing context on the threat landscape for group risk management activities.
Maintain a data source catalog containing information on indicators, correlations, and existing detection logic.
Collaborate with Threat Analysts to identify and recommend new internal and external data sources for developing additional threat detection logic.
Monitor the efficacy of existing detection logic and decommission or age-off rules as necessary.
Specialist Skills / Technical Knowledge Required for This Role:
Knowledge of banking processes and operational frameworks.
Strong understanding of information security processes, services, and systems.
Proficient in threat hunting techniques, zero-day exploit activities, and malware identification.
Knowledgeable in network monitoring and exploitation techniques.
Familiarity with SIEM configuration requirements and logic.
Good understanding of network protocols and web application attack vectors.
Knowledge of ISO 27001, NESA, PCI DSS, SWIFT, and other security standards and regulations.
Bachelor's degree in Computer Science, Engineering, IT, or a related technical discipline.
Relevant professional certifications such as Security+, CEH, GCIA, GCIH, CISSP.
Previous Experience:
7-9 years of experience in information security threat hunting within large international banks or financial institutions.
Experience with scripting/programming, exploitation techniques, and use case development.
Familiarity with common attack vectors and IOC datasets.
Experience in developing SIEM configuration logic.