HAWKEYE Cyber SOC Manager
  • United Arab Emirates Dubai
  • DTS Solution
1 year before
31.12.2023
Oversee and Govern
Cybersecurity Management
Job Description

Role and Responsibilities

Work as a Cyber SOC Manager in DTS Solution – HawkEye CSOC cyber command center.
Manage Security Operations Center (SOC) team and foster relationships with industry partners and customers to ensure monitoring compliance and smooth incident response.
Lead staff to proactively identify, prevent and respond to security incidents.
Business Development and support sales team to sell MSSP SOC as a Service.
Document, develop and improve the operational guidelines.
Develop and maintain KPI reports on services and solutions performances.
Work closely with dedicated DTS Solution - HawkEye CSOC Account Manager to address security expectations of DTS Solution - HawkEye CSOC customers.
Coordinate, follow up and escalate complex or major incidents with SOC team.
Keep a close collaboration during new projects with the security architects and security specialists in the technical delivery in order to setup security recommendations and have them implemented.
Manage team efforts to monitor for security events and provide first and final escalation analysis.
Lead staff in proactive change management for defensive controls and maintaining an effective defense for DTS Solution - HawkEye CSOC clients over time.
Collaborate with technical security assessment (intrusion testing) and cyber threat intelligence teams to validate security events and perform advanced analysis.
Produce and review aggregated performance metrics.
Play a significant role in long-term SOC strategy and planning, including initiatives geared toward DTS Solution - HawkEye CSOC’s operational excellence.
Supervises the activity of the SOC team.
Manages the escalation process and reviews incident reports.
Develops and executes crisis communication plan to CISO and other stakeholders.
Runs compliance reports and supports the audit process.
Measures SOC performance metrics and communicates the value of security operations to business leaders.
Lead DTS Solution - HawkEye CSOC security workshops with customers during on-boarding sessions.

Qualifications

8+ years of Information Security / Cyber security experience
3+ years working in a security operations center
3+ years in a leadership role
Business language of SIEM, SOC, MDR, Cyber Defense, SOAR, Threat Hunting, Threat Intel etc.

Certifications

CISSP, CISM, CISA
SANS certifications – GMON, GSNA, GCIH
CCNA, CCNP, MCSE
ITIL v3

Send CV

If you meet the job requirements, please send your CV to
hr@dts-solution.com


Quick response

Required Knowledge
  • K0001   Knowledge of computer networking concepts and protocols, and network security methodologies.
  • K0002   Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • K0004   Knowledge of cybersecurity and privacy principles.
  • K0005   Knowledge of cyber threats an`d vulnerabilities.
  • K0026   Knowledge of business continuity and disaster recovery continuity of operations plans.
  • K0033   Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).
  • K0038   Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.
  • K0040   Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
  • K0042   Knowledge of incident response and handling methodologies.
  • K0043   Knowledge of industry-standard and organizationally accepted analysis principles and methods.
  • K0046   Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
  • K0059   Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
  • K0061   Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
  • K0070   Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • K0101   Knowledge of the organization’s enterprise information technology (IT) goals and objectives.
  • K0106   Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities.
  • K0121   Knowledge of information security program management and project management principles and techniques.
  • K0180   Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Required Skills

Required Abilities
  • A0128  Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
  • A0161  Ability to integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robust software quality control process; and establishing multiple sources (e.g., delivery routes, for critical system elements).