
ENOC
Threat Intelligence Analyst – Cyber Security
- Permanent
- Dubai, United Arab Emirates
- Experience 5 - 10 yrs
Job expiry date: 30/05/2026
Job overview
Date posted
15/04/2026
Location
Dubai, United Arab Emirates
Salary
AED 30,000 - 40,000 per month
Compensation
Comprehensive package
Experience
5 - 10 yrs
Seniority
Experienced
Qualification
Bachelors degree
Expiration date
30/05/2026
Job description
The Threat Intelligence Analyst at ENOC is responsible for monitoring the organization’s IT and OT environment on a 24/7 basis to identify, assess, and counter cyber threats posed by threat actors against critical infrastructure and enterprise assets. The role involves gathering, analyzing, and interpreting raw cyber intelligence to identify indicators of compromise, emerging threats, vulnerabilities, tactics, techniques, and procedures used by adversaries. The analyst performs advanced threat modelling, produces intelligence reports, and provides actionable insights to security leadership and the Cyber Intelligence Center Manager in accordance with established policies, procedures, and SOPs. Responsibilities include monitoring external threat environments, tracking developments in cyber security technologies, analyzing vulnerability disclosures, and maintaining a taxonomy of indicators of compromise shared across security operations teams. The role also involves developing and enhancing SIEM correlation rules, use cases, and detection capabilities, integrating monitoring tools, and supporting SOC operations with advanced analytics and scripting knowledge. The analyst identifies intelligence gaps, submits requests for information, and collaborates with security analysts to investigate suspicious behavior. The position requires continuous monitoring of cyber threats, incident escalation, compliance with cybersecurity policies, and participation in 24/7 on-call support to ensure protection of ENOC’s IT/OT infrastructure in the energy sector.
Required skills
Key responsibilities
- Monitor ENOC IT and OT environments on a 24/7 basis to detect, analyze, and respond to cyber threats and adversary activity.
- Identify and analyze cyber threats, trends, vulnerabilities, and emerging developments affecting cybersecurity posture.
- Perform threat intelligence gathering and analysis on raw intelligence data from internal and external sources.
- Conduct advanced threat modelling of cyber incidents and escalate findings to the Cyber Intelligence Center Manager.
- Track and analyze Tactics, Techniques, and Procedures (TTPs) used by cyber threat actors.
- Identify and maintain Indicators of Compromise (IOCs) taxonomy and share with SOC and security teams.
- Produce strategic, tactical, and technical intelligence reports for management and stakeholders.
- Monitor external threat landscape and advise stakeholders on mitigation strategies.
- Analyze malware indicators such as implants, backdoors, and persistent adversary activity.
- Develop and enhance SIEM correlation rules, detection use cases, and monitoring capabilities.
- Integrate SIEM with other security tools and support automation using scripting knowledge.
- Collaborate with SOC analysts to investigate suspicious behavior and security incidents.
- Identify intelligence gaps and submit requests for information to improve threat visibility.
- Monitor cybersecurity vulnerabilities from vendors and third-party sources.
- Ensure compliance with cybersecurity policies, SOPs, and incident response procedures.
- Provide 24/7 on-call support for cybersecurity emergencies and incident escalation.
Experience & skills
- Bachelor’s degree in Computer Science, Engineering, Business, or equivalent field (or diploma with relevant experience).
- 7+ years of information security or technology experience.
- 4+ years of experience in cyber threat intelligence or related security roles.
- Professional cybersecurity certifications such as CISSP, GCTI, GCFA, GNFA preferred.
- Experience in cybersecurity threat monitoring and incident handling.
- Exposure to OT security operations center environments is preferred.
- Experience working across multiple industries such as energy, utilities, retail, or government is preferred.
- Strong understanding of SIEM systems and cybersecurity monitoring tools.
- Ability to perform advanced data analysis and cyber intelligence reporting.
- Experience with cybersecurity threat actor analysis and adversary tracking.
- Ability to work in 24/7 operational security environments.