
Emirates
Senior Threat Emulation Engineer
- Permanent
- Dubai, United Arab Emirates
- Experience 2 - 5 yrs
Job expiry date: 14/12/2025
Job overview
Date posted
30/10/2025
Location
Dubai, United Arab Emirates
Salary
Undisclosed
Compensation
Salary only
Experience
2 - 5 yrs
Seniority
Senior & Lead
Qualification
Bachelors degree
Expiration date
14/12/2025
Job description
The Senior Threat Emulation Engineer at Emirates plays a pivotal role in strengthening the organisationās cybersecurity posture through advanced adversary simulation. This position involves conducting intelligence-driven red team and breach simulation exercises to test detection, prevention, and response capabilities. The role demands expertise in offensive security, threat intelligence application, and cross-functional coordination with SOC, Incident Response, and Threat Engineering teams. The engineer will operate and enhance Breach and Attack Simulation (BAS) platforms, perform in-depth technical analysis, and present actionable remediation strategies. This position offers the opportunity to contribute to Emirates Group ITās world-class cybersecurity framework and to shape the organisationās long-term resilience strategy.
Required skills
Key responsibilities
- Design and execute adversary emulation scenarios based on real-world threat intelligence to test organizational readiness
- Operate and maintain Breach and Attack Simulation (BAS) platforms, simulating advanced threat actor tactics, techniques, and procedures (TTPs)
- Collaborate with SOC, Incident Response, and Threat Intelligence teams to identify and close detection and response gaps
- Analyse simulation results to identify vulnerabilities, control weaknesses, and detection inefficiencies
- Develop and present detailed technical reports and executive summaries for senior management
- Track remediation progress and verify closure of identified risks and weaknesses
- Research evolving adversary tradecraft and incorporate findings into simulation frameworks
- Contribute to security strategy development, aligning emulation outcomes with enterprise cyber resilience goals
- Automate repetitive offensive testing and reporting tasks using scripting languages such as Python, Go, or Bash
- Develop custom detection logic for SIEM systems (e.g., Splunk) to enhance security monitoring effectiveness
Experience & skills
- Bachelorās degree or equivalent in Information Technology, Information Security, or related field
- Minimum 3 years of hands-on experience in Red Teaming, offensive security, or adversary emulation
- Professional certifications such as OSCP, OSEP, CRTP, CRTE, GPEN (preferred)
- Strong understanding of network protocols, system architecture, and security technologies
- Proficiency in offensive tools and frameworks (e.g., Cobalt Strike, Metasploit, Empire, Caldera, etc.)
- Demonstrated ability to evade security controls and simulate realistic threat actor behaviors
- Experience with incident handling, including containment and recovery phases
- Skilled in scripting and automation (Python, Go, Bash)
- Proficiency in SIEM systems such as Splunk, including custom detection logic development
- Strong communication and report writing skills for technical and executive audiences
- Proven ability to work collaboratively with cross-functional security and IT teams
- Knowledge of social engineering, phishing simulation, and red team methodologies