Lead Analyst - Sector Domain (OT Cybersecurity)

Date: 6 Oct 2025

Location: Abu Dhabi, Abu Dhabi, AE

Company: G Forty Two General Trading LLC

Overview:

 OT Lead Analyst Sector Domain is the liaison officer of the sector in OT SOC and vice versa. Communicate activities, decision, etc. to the sector stakeholders.

Responsibilities:

  • Hold and provide all sector specific knowledge for all activities (incident response, threat hunting and etc.)
  • Coordinate mutual efforts between the OT SOC and the sector. For example, mutual incident response investigation
  • Establishing and maintaining relationships with internal and external stakeholders like suppliers, customers and incident response and security teams.
  • Creating and maintaining a comprehensive understanding of global/sector related cybersecurity risks and market requirements, including regulations and standards.
  • Supporting customer and teams with customer/sector cybersecurity questions and questionnaires
  • Representing OT SOC as a thought leader and expert in customer discussions regarding cybersecurity and sector related discussions
  • Perform assessment to monitor the adherence to applicable cybersecurity policies and industry best practices
  • Actively contributing to identify, manage and reduce cyber security risks.
  • Support and to drive internal cybersecurity awareness and training programs.
  • Active involvement in management discussions
  • Must be an articulate and persuasive leader who is able to communicate security related concepts to a broad range of technical and non-technical staff.
  • Coordinated efforts in line with the bigger picture to maximize the overall value of SOC delivery.
  • Collaborate and build relationship with internal and external parties to support SOC operations and sector related initiatives
  • Self-motivated, curious, knowledgeable pertaining to information security news and current events.
  • Highly result oriented and able to work independently.
  • Ability to build relationships and interact effectively with internal and external parties.
  • Comfortable with high-tech work environment, and constant learning of new tools and innovations

Qualifications:

  • Overall 8+ years’ experience working in a large-scale OT environment with focus on Information Security.
  • Overall 8+ years’ experience working in specific sector (Healthcare, Critical Infrastructure, Transportation, Finance, UtilitiesMinimum 5 years’ experience in Information and Cyber Security.
  • Any Bachelor’s Degree in Computer Science or Information Technology
  • ISC2 Certified Information Systems Security Professional (CISSP) and/or
  • GIAC Certification
  • Sector related certification(s)
  • Possess strong people and process management skills.
  • Proven skills in program management including project initiation, scoping, resourcing, scheduling, budgeting, risk management and communication.
  • Excellent interpersonal, presentation and facilitation skills.
  • Good analytical, technical, written and verbal communication skills.
  • Ability to multi-task in a fast paced and demanding work environment.
  • Ability to lead team with good co-ordination skills.
  • Good working knowledge of Office tools.
  • Ability to work effectively in a team and to lead a team to accomplish SOC goals and objective.
  • Knowledge of current and emerging threats/threat vectors.
  • Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
  • Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins.
  • Knowledge of new and emerging information technology (IT) and information security technologies.
  • Knowledge of Information security GRC, standards, best practices and concepts.
  • Knowledge of applicable Information and cyber security related laws and regulations.
  • Knowledge of disaster recovery and continuity of operations plans.
  • Knowledge of Cyber kill chain and other frameworks such as NIST, ISO, SANS, etc.
  • Knowledge of defense-in-depth techniques and of different classes of attacks (e.g., passive, active, insider, close-in, distribution)
  • Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non-nation state sponsored], and third generation [nation state sponsored]).
  • Skill in recognizing and categorizing types of vulnerabilities and associated attacks.
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • Knowledge of hacking methodologies in Windows or Unix/Linux environment Surveillance and of penetration testing principles, tools, and techniques (e.g., metasploit, neosploit).
  • Knowledge of programming language structures and logic.
  • Knowledge of webmail collection, searching/analyzing techniques, tools, and cookies Web Technology.
  • Skill in performing damage assessments.
  • Skill in performing packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)
  • Knowledge of malware and malware analysis tools (e.g., Olly Debug, Ida Pro).
  • Skill in analyzing anomalous code as malicious or benign.
  • Knowledge of types and collection of persistent data and of basic concepts and practices of processing digital forensic data.
  • Skill in analyzing memory dumps to extract information and in analyzing volatile data and identifying obfuscation techniques.
  • Knowledge of forensic processes for seizing and preserving digital evidence (e.g., chain of custody).
  • Skill in preserving evidence integrity according to standard operating procedures or national standards
  • Knowledge of OT Sensors ( Nozomi, Dragos, Claroty )
  • Knowledge of IEC 62443