
G42
Senior Consultant – Incident Response
- Permanent
- Abu Dhabi, United Arab Emirates
- Experience 5 - 10 yrs
Job expiry date: 27/10/2025
Job overview
Date posted
12/09/2025
Location
Abu Dhabi, United Arab Emirates
Salary
Undisclosed
Compensation
Comprehensive package
Experience
5 - 10 yrs
Seniority
Senior & Lead
Qualification
Bachelors degree
Expiration date
27/10/2025
Job description
As a Senior Consultant in Incident Response at CPX, you will act as a technical leader in delivering cybersecurity solutions and supporting clients in both proactive and reactive cyber defense efforts. The role requires serving as the technical lead during active incident response engagements, working with retainer clients, and collaborating with blue teams to enhance defensive postures. You will execute threat-hunting activities, conduct forensic investigations across multiple platforms, analyze host and network data, and produce detailed technical reports. Additionally, you will contribute to process documentation, develop remediation strategies, and communicate findings to both technical and non-technical stakeholders. This position demands expertise in modern attack trends, forensic analysis, and incident response frameworks, alongside certifications such as GIAC (GNFA, GCIH, GCIA, GCFE, GCFA, GDAT, etc.).
Required skills
Key responsibilities
- Serve as technical lead on active incident response engagements and IR Retainer customers
- Independently achieve tasks after onboarding period
- Conduct threat-hunting activities for incident response and proactive assessments
- Perform host-based assessments using EDR tools and network packet data analysis
- Execute host and network forensics across Windows, Mac, and Linux platforms
- Conduct digital forensic investigations to support incident response
- Collaborate with customers to improve defensive security posture and controls
- Document processes and contribute to continuous service improvements
- Produce detailed reports and technical briefs for clients
- Communicate technical findings to both technical and non-technical stakeholders
Experience & skills
- Minimum 6 years of work experience in cybersecurity or incident response
- Strong understanding of blue team operations and threat hunting
- Sound knowledge of TCP/IP protocols, Windows, Linux, and OSX
- Forensic skills across multiple operating systems
- Experience with network analysis tools (Bro/Zeek, Rita, Suricata)
- Ability to analyze system and network device logs
- Knowledge of malware analysis (static and dynamic)
- Familiarity with enterprise systems and infrastructure security
- Strong knowledge of targeted attacks and remediation planning
- Understanding of current threats, vulnerabilities, and attack trends
- Proficiency with ATT&CK framework
- Experience with EDR tools and threat-hunting platforms
- GIAC certification (GNFA, GCIH, GCIA, GCFE, GCFA, GDAT, or equivalent)
- Knowledge of cloud security infrastructure (AWS, Azure, Oracle) is desirable
- Bachelor’s degree in Computer Science, Engineering, or related field (desirable)
- Excellent organizational and reporting skills
- English proficiency, both spoken and written