
G42
Senior Specialist - Security Operations
- Permanent
- Abu Dhabi, United Arab Emirates
- Experience 5 - 10 yrs
Job expiry date: 13/05/2026
Job overview
Date posted
30/03/2026
Location
Abu Dhabi, United Arab Emirates
Salary
AED 20,000 - 30,000 per month
Compensation
Job description
Senior Specialist - Security Operations at Space42 responsible for supporting Security Operations Center (SOC) and Threat Intelligence functions by monitoring, detecting, analyzing, and responding to cyber threats targeting enterprise systems. The role operates within an AI-powered SpaceTech environment integrating satellite communications, geospatial analytics, and artificial intelligence capabilities. The position involves advanced threat intelligence, intrusion analysis, malware reverse engineering, and proactive security operations to strengthen cyber defense capabilities across large-scale enterprise infrastructure. Responsibilities include monitoring SIEM, EDR, and NDR tools, performing incident triage, containment, eradication, and recovery, correlating logs from network, endpoint, cloud, and application sources, and managing SIEM use cases and alert tuning. The role conducts digital forensics, post-incident analysis, and maintains incident documentation aligned with regulatory requirements while coordinating with internal and external stakeholders. The Senior Specialist analyzes network telemetry, endpoint logs, threat feeds, correlates Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs), and conducts proactive threat hunting. The role includes malware analysis and reverse engineering using Ghidra, IDA Pro, x64dbg, and Cuckoo Sandbox, developing YARA rules and behavioral signatures, maintaining malware repositories, and supporting detection engineering improvements. The position requires experience with Defender EDR, Darktrace NDR, Tenable vulnerability management, scripting using Python, PowerShell, and Bash, and knowledge of STIX/TAXII, OpenIOC, Sigma, and Snort. The role also involves integrating threat intelligence into SOC workflows, building detection use cases, and supporting enterprise-level cybersecurity operations.
Required skills
Key responsibilities
- Monitor SIEM, EDR, NDR, and security tools to detect suspicious activity, perform incident triage, investigation, containment, eradication, and recovery while maintaining incident documentation aligned with regulatory requirements
- Correlate logs from network, endpoint, cloud, and application sources, develop SIEM use cases, tune alerts, and support digital forensics and post-incident analysis
- Analyze network telemetry, endpoint logs, and threat intelligence feeds to identify intrusion attempts, correlate Indicators of Compromise (IOCs), and map Tactics, Techniques, and Procedures (TTPs)
- Conduct proactive threat hunting, provide threat context, attribution insights, and support investigations using threat intelligence platforms
- Perform static and dynamic malware analysis using Ghidra, IDA Pro, x64dbg, and Cuckoo Sandbox while reverse engineering binaries and scripts
- Develop detection logic using Sigma, Snort, YARA, and custom scripts while maintaining malware repositories and behavioral signatures
- Coordinate with internal teams and external stakeholders during security incidents while integrating threat intelligence into SOC workflows
- Develop automation and enrichment scripts using Python, PowerShell, and Bash to improve detection, response, and security operations efficiency
Experience & skills
- Demonstrate minimum 7 years experience in Security Operations, Threat Intelligence, Malware Analysis, or Incident Response within enterprise environments
- Possess strong understanding of threat actor methodologies, APT groups, and cybercrime ecosystems
- Demonstrate hands-on experience with SIEM platforms including Microsoft Sentinel, SOAR platforms, and threat intelligence platforms
- Demonstrate proficiency with malware analysis tools including Ghidra, IDA Pro, Cuckoo Sandbox, and packet analysis tools including Wireshark and tcpdump
- Demonstrate experience with Defender EDR, Darktrace NDR, and Tenable vulnerability management platforms
- Demonstrate strong scripting skills using Python, PowerShell, and Bash for automation and enrichment
- Possess knowledge of intelligence sharing standards including STIX/TAXII, YARA, and OpenIOC
- Hold Bachelor’s degree in Computer Science, Information Security, or related field with professional certifications such as CEH, CISSP, or CISA preferred