At Careem, we are driven by the purpose of simplifying the lives of people and building an awesome organization that inspires. Based in Dubai, we started our journey as a pioneer of the Middle East’s ride-hailing economy. Today, Careem is the region’s everyday Super App operational in 13 countries and over 100 cities. The Super App provides a host of daily services that people need to move around, to order things and to transfer money in one unified smartphone app. Our goal is to simplify people’s daily lives so that they can spend their precious time and mindshare on things that really matter and on realizing their potential.

About the Role:

Careem is looking for an experienced L2 SOC analyst as we are ramping up the Cyber Fusion Center. The person working in the SOC team operates the security monitoring solutions, reacting timely to security events as identified. SOC analysts will be responsible for monitoring computer security events according to documented procedures and industry best practices. First line of defense in protecting's information systems from internal and external threats.

The L2 SOC Analyst will be responsible for working within a team to provide continuous security monitoring and incident handling, threat and vulnerability management, threat hunting, incident response, and purple teaming daily tasks.

This is a shift based role, to provide 24/7/365 security services to the business. The successful applicant will have a demonstrable passion for security and willingness to progress within the role and support the Senior SOC Analysts with rule tuning, use case development, purple teaming, threat and vulnerability management, threat hunting, DFIR, and cyber threat intelligence.

Key Accountabilities:

  • Responsible for the validation and analysis of investigations within Security Operations Center (SOC) Analyst
  • Responsible for the monitoring, validation and analysis of investigations of events and alerts on AWS Cloud Infrastructure, SaaS applications and onprem infrastructure
  • Provide expert analysis of Cloudtrail, CloudWatch,  VPC Flow logs for event/incident analysis
  • Guide and support automate security alerts and use cases  in AWS cloud
  • Carry out triage of incoming issues (initial assessing the priority of the event, initial determination of incident to determine risk and damage or appropriate routing of security or privacy data request)
  • Proactively identify vulnerabilities across the entire infrastructure environments and suggest updating of SIEM use cases to generate alerts
  • ‘On Call’ availability for rare ‘fire drill’ scenarios, for example on high-critical incident response scenarios, or emergent imminent widespread threats requiring urgent action
  • Provide communication and escalation throughout the incident per the SOC guidelines.
  • Identify and manage a wide range of intelligence sources to provide a holistic view of the threat landscape and filter out noise in order to focus and execute upon actionable intelligence
  • Ensure that all security events and incidents (internal / external) are logged into Jira and regularly updated  and closed within the set SLA’s
  • Leading the development of actionable use cases to detect, triage, investigate and remediate based on latest threat actor trends, support teams with the technical implementation of parsing log sources creating, validating and testing alerting queries to reduce false positives

Qualifications:

  1. Minimum 3+ years of operational experience preferred in security operations center, threat intelligence, insider threat operations, threat management, cyber security, information security or related functions.
  2. Bachelor's degree in Computer Science, Management Information Systems, Information Systems, or a related field/experience is required. Experience within financial services areas is preferred.
  3. Strong knowledge of Security Methodologies and Frameworks.

Must have experience: 

  • Experience in Highly available 24x7 Enterprise Operational Environment
  • Familiarity with cloud architecture/infrastructure and general networking principles.
  • Experience with virtualization technologies, especially with AWS services.
  • Strong demonstrated knowledge of web protocols, common attacks, and an in-depth knowledge of Linux/Unix tools and architecture.
  • System administration, configuration and patch management, zone security, firewall and IAM
  • SOC / Pen-Tester / Purple Team / Threat Intelligence / Threat Hunting or similar background, or demonstrable experience through self study

Proven success in working  SOC function/team, including (but not limited to):

  • Experience maintaining metrics, reporting and SLAs
  • Security operations experience with operating systems, AWS cloud infrastructures
  • Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework
  • Strong analytical skills and attention to detail
  • Experience around security processes and technologies
  • Ability to research, analyze, and resolve complex problems with minimal supervision and escalate issues as appropriate
  • Thorough documentation skills
  • Outstanding written and verbal communication skills
  • Must be a  highly motivated individual with the ability to self-start, prioritize, and multi-task

 

Apply for this Job

* Required