Splunk - SOC
This SOC Analyst role at KTek Resourcing focuses on threat detection, incident investigation, and response. The successful candidate will monitor Splunk SIEM alerts, manage SOAR playbooks, and conduct threat hunting activities. The position requires strong proficiency in log analysis, network security, and various security tools. It is an onsite role based in Dubai requiring 3-5 years of relevant security operations experience.
50k new jobs listed every day. Install TAL to find more jobs like this.

Experience
3-5 years
Function
Engineering
Work mode
Onsite, UAE
Company
Tier 3
What you will work on
This SOC Analyst role at KTek Resourcing focuses on threat detection, incident investigation, and response. The successful candidate will monitor Splunk SIEM alerts, manage SOAR playbooks, and conduct threat hunting activities. The position requires strong proficiency in log analysis, network security, and various security tools. It is an onsite role based in Dubai requiring 3-5 years of relevant security operations experience.
TAL's take
Role is via a staffing agency rather than the end employer, which limits long-term growth clarity and increases uncertainty.
The JD provides a highly detailed list of responsibilities, technical requirements, and incident response expectations.
Must haves
- 3-5 years of experience in SOC or cybersecurity operations
- Strong experience with Splunk SIEM tool
- Hands-on experience with any SOAR platforms
- Knowledge of network security protocols
- Understanding of Windows and Linux operating systems
- Bachelor's degree in Cybersecurity, IT, or Computer Science
Tools and skills
Nice to have: aws, azure, python, powershell.
About the company
Staffing and recruitment agency.