RP
Incident Response Security Engineer
RecruitMe Plus
UAE · On-site Today
About the role
About the job
Incident Response Security Engineer
Position Overview
Our client is seeking a highly skilled and detail-oriented Incident Response Security Engineer to join their team in Dubai. The ideal candidate will lead host-based investigations and compromise assessments across Unix/Linux and Windows environments, leveraging UAC and large-scale artifact triage to identify, contain, and remediate advanced threats within telecommunications infrastructures.
Key Responsibilities & Role
1. Incident Detection & Investigation (Telecom & Host-Based)
- Investigate security incidents within telecommunications environments, including core network, signaling, and service platforms.
- Analyze incidents involving telecom protocols and systems (e.g., SS7, SIP, Diameter, VoIP, signaling infrastructure).
- Perform deep host-based investigations on compromised systems.
- Conduct advanced investigations on Unix/Linux-based systems and supporting services.
2. Compromise Assessment & Threat Analysis
- Lead and support compromise assessments to determine attacker presence, persistence, and lateral movement.
- Execute large-scale artifact triage across enterprise Windows and Linux fleets.
- Identify indicators of compromise (IOCs), attacker techniques, and affected assets.
3. Digital Forensics & Artifact Collection
- Collect and analyze host artifacts such as logs, processes, memory, persistence mechanisms, and network connections.
- Use and customize UAC (Unix-like Artifacts Collector) scripts for scalable evidence collection.
- Ensure forensic soundness and proper evidence handling.
4. Containment, Eradication & Recovery
- Recommend and execute containment strategies tailored to telecom infrastructure and production systems.
- Support eradication of malicious artifacts and validate system integrity post-remediation.
- Work closely with operations teams to minimize service disruption.
5. Threat Hunting & Proactive Detection
- Conduct proactive threat hunting across Unix/Linux and Windows systems using known TTPs and telecom-specific threat models.
- Correlate host-based findings with network and signaling activity.
6. Incident Response Process & Playbooks
- Contribute to the development and refinement of incident response playbooks for telecom environments.
- Improve investigation workflows for host-based and large-scale incident scenarios.
7. Reporting, Collaboration & Knowledge Transfer
- Produce clear technical reports detailing findings, impact, and remediation actions.
- Brief stakeholders, SOC teams, and leadership on incident scope and risk.
- Share investigation techniques and lessons learned to strengthen detection capabilities.
Qualifications & Skills
- Background in telecommunications incident response and is familiar with telecom concepts and protocols.
- Prior investigation experience on Unix-based systems.
- Investigation background with direct experience in host-based investigations.
- Practical experience in using or customizing UAC script.
- Prior experience in conducting compromise assessments and large-scale artifact triage across both Windows and Linux environments.
Requirements
- Background in telecommunications incident response and is familiar with telecom concepts and protocols.
- Prior investigation experience on Unix-based systems.
- Investigation background with direct experience in host-based investigations.
- Practical experience in using or customizing UAC script.
- Prior experience in conducting compromise assessments and large-scale artifact triage across both Windows and Linux environments.
Responsibilities
- Investigate security incidents within telecommunications environments, including core network, signaling, and service platforms.
- Analyze incidents involving telecom protocols and systems (e.g., SS7, SIP, Diameter, VoIP, signaling infrastructure).
- Perform deep host-based investigations on compromised systems.
- Conduct advanced investigations on Unix/Linux-based systems and supporting services.
- Lead and support compromise assessments to determine attacker presence, persistence, and lateral movement.
- Execute large-scale artifact triage across enterprise Windows and Linux fleets.
- Identify indicators of compromise (IOCs), attacker techniques, and affected assets.
- Collect and analyze host artifacts such as logs, processes, memory, persistence mechanisms, and network connections.
- Use and customize UAC (Unix-like Artifacts Collector) scripts for scalable evidence collection.
- Ensure forensic soundness and proper evidence handling.
- Recommend and execute containment strategies tailored to telecom infrastructure and production systems.
- Support eradication of malicious artifacts and validate system integrity post-remediation.
- Work closely with operations teams to minimize service disruption.
- Conduct proactive threat hunting across Unix/Linux and Windows systems using known TTPs and telecom-specific threat models.
- Correlate host-based findings with network and signaling activity.
- Contribute to the development and refinement of incident response playbooks for telecom environments.
- Improve investigation workflows for host-based and large-scale incident scenarios.
- Produce clear technical reports detailing findings, impact, and remediation actions.
- Brief stakeholders, SOC teams, and leadership on incident scope and risk.
- Share investigation techniques and lessons learned to strengthen detection capabilities.
Skills
DiameterLinuxSIPSS7UACUnixVoIPWindows
Don't send a generic resume
Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.
Get started free