Submitting more applications increases your chances of landing a job.

Here’s how busy the average job seeker was last month:

Opportunities viewed

Applications submitted

Keep exploring and applying to maximize your chances!

Looking for employers with a proven track record of hiring women?

Click here to explore opportunities now!
We Value Your Feedback

You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for

Would You Be Likely to Participate?

If selected, we will contact you via email with further instructions and details about your participation.

You will receive a $7 payout for answering the survey.


User unblocked successfully
https://bayt.page.link/u1jv6c3AFk14vYEB7
Back to the job results

Incident Response Security Engineer

30+ days ago 2026/05/07
Other Business Support Services
Create a job alert for similar positions
Job alert turned off. You won’t receive updates for this search anymore.

Job description

About the job Incident Response Security Engineer

Position Overview:


Our client is seeking a highly skilled and detail-oriented Incident Response Security Engineer to join their team in Dubai. The ideal candidate will lead host-based investigations and compromise assessments across Unix/Linux and Windows environments, leveraging UAC and large-scale artifact triage to identify, contain, and remediate advanced threats within telecommunications infrastructures.


Key Responsibilities & Role:


1. Incident Detection & Investigation (Telecom & Host-Based):


  • Investigate security incidents within telecommunications environments, including core network, signaling, and service platforms.
  • Analyze incidents involving telecom protocols and systems (e.g., SS7, SIP, Diameter, VoIP, signaling infrastructure).
  • Perform deep host-based investigations on compromised systems.
  • Conduct advanced investigations on Unix/Linux-based systems and supporting services.

2. Compromise Assessment & Threat Analysis:


  • Lead and support compromise assessments to determine attacker presence, persistence, and lateral movement.
  • Execute large-scale artifact triage across enterprise Windows and Linux fleets.
  • Identify indicators of compromise (IOCs), attacker techniques, and affected assets.

3. Digital Forensics & Artifact Collection:


  • Collect and analyze host artifacts such as logs, processes, memory, persistence mechanisms, and network connections.
  • Use and customize UAC (Unix-like Artifacts Collector) scripts for scalable evidence collection.
  • Ensure forensic soundness and proper evidence handling.

4. Containment, Eradication & Recovery:


  • Recommend and execute containment strategies tailored to telecom infrastructure and production systems.
  • Support eradication of malicious artifacts and validate system integrity post-remediation.
  • Work closely with operations teams to minimize service disruption.

5. Threat Hunting & Proactive Detection:


  • Conduct proactive threat hunting across Unix/Linux and Windows systems using known TTPs and telecom-specific threat models.
  • Correlate host-based findings with network and signaling activity.

6. Incident Response Process & Playbooks:


  • Contribute to the development and refinement of incident response playbooks for telecom environments.
  • Improve investigation workflows for host-based and large-scale incident scenarios.

7. Reporting, Collaboration & Knowledge Transfer:


  • Produce clear technical reports detailing findings, impact, and remediation actions.
  • Brief stakeholders, SOC teams, and leadership on incident scope and risk.
  • Share investigation techniques and lessons learned to strengthen detection capabilities.

Qualifications & Skills:


  • Background in telecommunications incident response and is familiar with telecom concepts and protocols.
  • Prior investigation experience on Unix-based systems.
  • Investigation background with direct experience in host-based investigations.
  • Practical experience in using or customizing UAC script.
  • Prior experience in conducting compromise assessments and large-scale artifact triage across both Windows and Linux environments.


This job post has been translated by AI and may contain minor differences or errors.

You’ve reached the maximum limit of 15 job alerts. To create a new alert, please delete an existing one first.
Job alert created for this search. You’ll receive updates when new jobs match.
Are you sure you want to unapply?

You'll no longer be considered for this role and your application will be removed from the employer's inbox.