Director - SOC Monitoring (CPX)

Date: 19 May 2026

Location: MBZ City, Abu Dhabi, AE

Company: G Forty Two General Trading LLC

Overview:

Director, Security Operations Center (SOC) – AI-Driven Cyber Defense Operations

Role Summary

We are seeking a visionary and operationally strong Director of Security Operations Center (SOC) to lead next-generation cyber defense operations powered by Artificial Intelligence (AI), automation, and advanced analytics.

This role is responsible for overseeing enterprise-wide security monitoring, threat detection, incident response, cyber resilience, and SOC transformation initiatives, with a strong emphasis on integrating AI-driven security operations, Generative AI (GenAI), machine learning (ML), and autonomous response capabilities into the SOC ecosystem.

The Director will lead the evolution from a traditional SOC to an AI-Augmented SOC capable of predictive threat detection, intelligent automation, behavioral analytics, and accelerated incident response.

Responsibilities:

Key Responsibilities

AI-Driven Security Operations Leadership

  • Develop and execute the enterprise AI-enabled SOC strategy and roadmap.
  • Lead transformation initiatives toward an AI-Augmented / Autonomous SOC operating model.
  • Implement AI and ML capabilities for:
    • Threat detection
    • Behavioral analytics
    • Anomaly detection
    • Predictive risk scoring
    • Automated triage
    • Intelligent alert correlation
  • Drive adoption of Generative AI (GenAI) security copilots to improve analyst productivity and incident investigation efficiency.
  • Establish governance, risk controls, and ethical usage standards for AI within cyber operations.
  • Evaluate emerging AI cybersecurity technologies and lead strategic adoption initiatives.

 

SOC Operations & Incident Response

  • Lead 24x7 enterprise SOC operations across detection, investigation, response, recovery, and escalation management.
  • Oversee SOC analysts, threat hunters, detection engineers, incident responders, and automation engineers.
  • Direct major cyber incident response activities including ransomware, APTs, insider threats, cloud compromises, and AI-enabled attacks.
  • Ensure rapid containment and remediation through AI-assisted response workflows and SOAR orchestration.

AI Security & Emerging Threat Defense

  • Develop capabilities to detect and mitigate:
    • AI-generated phishing attacks
    • Deepfake-enabled social engineering
    • LLM abuse and prompt injection attacks
    • Adversarial AI threats
    • AI model exploitation
    • Data poisoning and model manipulation risks
  • Collaborate with AI/ML engineering teams to secure enterprise AI systems and models.
  • Establish monitoring and security controls for enterprise GenAI platforms and AI-powered applications.



Security Engineering & Automation

  • Oversee AI-integrated security technologies including:
    • SIEM
    • SOAR
    • UEBA
    • EDR/XDR
    • AI threat intelligence platforms
    • Cloud-native security analytics
  • Lead SOC automation initiatives to reduce manual effort and improve operational efficiency.
  • Drive continuous improvement of detection engineering and telemetry optimization.

Threat Intelligence & Threat Hunting

  • Lead AI-assisted threat hunting and proactive cyber defense operations.
  • Integrate threat intelligence feeds with AI analytics platforms for predictive detection capabilities.
  • Leverage MITRE ATT&CK and behavioral analytics to identify emerging attack patterns.

Qualifications:

  • Bachelor’s degree in Cybersecurity, Computer Science, AI, Data Science, or related field.
  • 10+ years of cybersecurity experience with 5+ years leading enterprise SOC operations.
  • Proven experience implementing AI/ML technologies in cybersecurity operations environments.
  • Strong expertise in:
    • AI-driven SOC platforms
    • SIEM/SOAR
    • EDR/XDR
    • Threat intelligence
    • Cloud security
    • Detection engineering

Key Technologies

  • SIEM: Splunk, Microsoft Sentinel, QRadar
  • SOAR: Cortex XSOAR, Splunk SOAR
  • EDR/XDR: CrowdStrike, SentinelOne, Defender
  • AI Security Platforms & Security Copilots
  • UEBA & Behavioral Analytics
  • Cloud Security: AWS, Azure, GCP
  • Threat Intelligence Platforms
  • Python, automation scripting, APIs
  • Machine Learning & AI analytics frameworks
    • MITRE ATT&CK
  • Experience with security automation and orchestration.
  • Knowledge of AI security risks, adversarial AI, and GenAI security considerations.
  • Strong leadership, crisis management, and executive communication skills.



Preferred Qualifications

  • Master’s degree in Cybersecurity, Artificial Intelligence, Machine Learning, or Information Assurance.
  • Industry certifications such as:
    • CISSP
    • CISM
    • GIAC
    • GCIH
    • GCFA
    • Microsoft Security certifications
    • Cloud security certifications
  • Experience with:
    • GenAI security governance
    • LLM security
    • Autonomous SOC technologies
    • AI copilots for SecOps
    • Cloud-native SOC architectures