Job Search and Career Advice Platform
1

Business Intelligence Analyst jobs in United Arab Emirates

Threat Intelligence Analyst - Emirati Talent

Project Management Institute

Dubai
On-site
AED 250,000 - 350,000
27 days ago
I want to receive the latest job alerts for “Business Intelligence Analyst” jobs

Top job titles:

Office Administrator jobsNuclear Medicine Technician jobsHse Manager jobsJunior Software Developer jobsClinical Data Analyst jobsImmigration Lawyer jobsPiping Design Engineer jobsSearch Engine Optimization Specialist jobsPrimary Care Physician jobsScience Editor jobs

Top companies:

Jobs at TransguardJobs at Qatar AirwaysJobs at Air ArabiaJobs at McdonaldsJobs at UpsJobs at MaerskJobs at Standard CharteredJobs at AwsJobs at HalliburtonJobs at Johnson And Johnson

Top cities:

Jobs in DubaiJobs in Abu DhabiJobs in SharjahJobs in AjmanJobs in Al AinJobs in Fujairah

Similar jobs:

Data Analyst jobsBusiness Analyst jobsBusiness Development Manager jobsBusiness Development Executive jobsFinance Analyst jobsHr Business Partner jobsData Analyst Remote jobsBusiness Development Associate jobsQuality Assurance Analyst jobsBusiness Administrator jobs
Threat Intelligence Analyst - Emirati Talent
Project Management Institute
Dubai
On-site
AED 250,000 - 350,000
Full time
28 days ago

Job summary

A leading project management organization in Dubai is seeking a Cyber Threat Analyst to monitor cyber threats and develop strategic responses. The ideal candidate has over 7 years of experience in information security and relevant certifications. This role involves developing intelligence reports, analyzing threats, and working with a cybersecurity team to enhance defense mechanisms. Candidates with experience in multiple industries and security operations are preferred.

Qualifications

  • 7+ years of Information security or technology experience.
  • 4+ years in relevant experience.
  • Working experience in multiple industries is preferable.
  • Exposure to OT security operation center experience is a plus.

Responsibilities

  • Monitor the ENOC environment 24/7 for cyber threats.
  • Analyze cyber threats, trends, and developments.
  • Produce quality intelligence reports for management.
  • Provide actionable intelligence through reports and presentations.
  • Participate in development of correlation rules in SIEM.

Skills

Information security
Threat intelligence
Data analysis
Incident response
Analytic tradecraft
Scripting knowledge

Education

Bachelor’s degree in Computer Science, Engineering or Business
CISSP certification
GCTI certification
GCFA certification
GNFA certification
Job description

The primary function of this role is to monitor the ENOC environment on 24*7 basis and conduct intelligence gathering to identify, monitor, assess, and counter the threat posed by cyber threat actors against ENOC IT/OT assets. In addition to preforming advance threat modelling of the cyber security incident and escalate to Cyber Intelligence Center Manager as per approved policies, processes and procedures.

Principal Accountabilities

Operational

  • Follow response procedures and other CIC related SOPs based on the incident impact analysis & predetermined response actions procedures Manage the communication of policies & guidelines and monitor the compliance CIC operations to the cyber-security policies & guidelines.
  • Identify cyber threats, trends, and new developments on various cyber security topics by analyzing raw intelligence and data.
  • Track developments and changes in the technology field and cyber threat environments to ensure that they're adequately addressed in cyber security strategy plans and architecture artefacts
  • Monitor the external threat environment for emerging threats, and advise relevant stakeholders on the appropriate courses of action
  • Monitor security vulnerability information from vendors and third parties
  • Establish a taxonomy of indicators of compromise (IOCs) and share this detail with other security unites, including the security operations center (CIC)
  • Perform analysis of data and information pertaining to ENOC line of business as well as critical infrastructure current cybersecurity posture, specifically as it pertains to indicators of compromise (e.g., implants, backdoors, and other malware which indicate the presence of a persistent adversary).
  • produce quality intelligence reports for management and other teams.
  • Apply understood analytic tradecraft to gathered intelligence in a consistent manner Investigate, document, and report on information cybersecurity issues and emerging trends
  • Identify and monitor the Tactics, Techniques, and Procedures (TTPs) used by cyber threat actors by analysing raw intelligence and data.
  • Identify intelligence gaps and submit requests for information to fill gaps.
  • Provide actionable strategic, technical, and tactical cyber information and intelligence through reports, briefings, and presentations
  • Make analytical predictions about cyber threat actors and their future activities based on what is already known about them
  • Effectively recognize threats by performing relevant research and data analysis using both internal and external tools and resources.
  • Work closely with security analysts and senior analysist to get direct feedback about new, unknown suspicious behaviour
  • Provide functional support and content development and improvements for the SIEM and other security technologies used by CIC.
  • Participate in Development and implementation of new correlation rules and use-cases in SIEM and enhance the monitoring and detection capabilities of the CIC to integrate SIEM with other monitoring tools with appropriate scripting knowledge skills
  • Should be on-call 24 hours per day to respond to cyber security emergences

Education

  • Degree: Bachelor’s degree in Computer Science, Engineering or Business field
  • Required professional certifications: CISSP, GCTI , GCFA, GNFA

Experience

  • 7+ years of Information security or technology experience.
  • 4+ years in relevant experience.
  • Working experience in multiple industries (e.g. Energy, Utilities, Retail, Government…) is preferable.
  • Working experience in cyber security threats monitoring and handling
  • Exposer to OT security operation center experience will be a pulse.

* The salary benchmark is based on the target salaries of market leaders in their relevant sectors. It is intended to serve as a guide to help Premium Members assess open positions and to help in salary negotiations. The salary benchmark is not provided directly by the company, which could be significantly higher or lower.

Job Search and Career Advice Platform
Land a better
job faster
Follow us
JobLeads Youtube ProfileJobLeads Linkedin ProfileJobLeads Instagram ProfileJobLeads Facebook ProfileJobLeads Twitter AccountJobLeads Xing Profile
Company
  • Customer reviews
  • Careers at JobLeads
  • Site notice
Services
  • Free resume review
  • Job search
  • Headhunter matching
  • Career advice
  • JobLeads MasterClass
  • Browse jobs
Free resources
  • 5 Stages of a Successful Job Search
  • 8 Common Job Search Mistakes
  • How Long should My Resume Be?
Support
  • Help
  • Partner integration
  • ATS Partners
  • Privacy Policy
  • Terms of Use

© JobLeads 2007 - 2025 | All rights reserved