Your future role & Job Purpose
One of our prestigious clients in Kingdom of Saudi Arabia is looking to hire an Information Security Manager.
Our client is a recognized company expert in a particular area of Information Technology and related discipline. The Information Security Manager will be responsible to provide high level of technical expertise and professional assistance advice guidance in the development and utilization of new and existing computer systems equipment techniques and facilities. He originates solutions to recurring problems recommends or participates in feasibility and cost studies and proposes alternatives for meeting forecasted workloads based on extensive knowledge of current and longrange trends in computer technology systems applications and overall computing infrastructure.
Primary Accountabilities
- Within guidelines provided by the Department head incumbent undertakes studies develops plans and furnishes expertise regarding the most sophisticated computer and facility equipment data center infrastructures and/or systems within his area of assignment. The work performed impacts all organization that require daily interaction with computerbased systems as well as all organizations involved in planning operating and maintaining Company computer systems and Data Centre facilities. The incumbent should provide support for operations 24 hours/day seven days per week. Incumbents recommendations which result in more efficient use of computer resources and manpower can produce significant saving for the Company. Principal duties will be concerned with matters related to software computing hardware or Data Centre operations depending on the assigned IT departments. The incumbent should participate in supporting coaching and developing plans for younger talents in his area of expertise. He reports to and receives broad general guidance from VP of IT function.
- Provides advice guidance and support during the preliminary and startup phases of new major systems; maintains schedules for major equipment or program installations upgrades or conversions; coordinates details with all related entities and vendors; reviews proposals with respect to crosscompany applications infrastructures.
- Analyses special assignments pertaining to recurring applications or operations problems; proposes scope and course of action; recommends the use of tasks forces if required; makes suggestions to Management; follows through to a satisfactory conclusion.
- Reviews existing operations within his area of assignment to determine potential problems; performs cost analyses and performance surveys; recommends and develops solutions to problems and deficiencies; suggests revisions to standards and procedures as necessary.
- Keeps informed of trends and developments throughout the computer industry; analyses various economic alternatives for Company investment in computer resources and provides background information regarding the profitable application of computer technology.
- Guides counsels develops and trains personnel in organizations to ensure their thorough understanding of systems and equipment conversions support infrastructures or upgrades; provides solutions to problems that recur during the utilization of installed systems and equipment; monitors technical work performance for adherence to accepted professional standards as well as clients internal standards.
- Participates in the activities of computer and professional societies; serves on working committees within such groups; may attend national and international congresses or conferences.
- Overseas the SOC operations Identity & Access Management GRC and Vulnerability Management as per Cybersecurity framework and associated policy procedures.
- Performs and/or facilitates risk assessments vulnerability tests and reports to management with findings and undertake measures to ensure conformance.
Communication and Working Relationships
Internal: Frequent contact with all levels of technical professional and management personnel to executive duties and to make presentations; occasional contact with Executive Management. Contact with management and personnel in both support and user organizations to carry out studies provides assistance etc.
External: Contact with colleagues in other companies and technical societies to keep abreast of developments and to make presentations with SAG Ministries and Shareholder representatives through participation in joint conferences. Contact with industry professionals and leaders for purpose of exchanging knowledge and sharing experiences.
Who we are looking for:
- Bachelors degree in computer science Management Information Technology Engineering.
- Preferably 11 plus years industrial work experience of which 7 years in Information Security systems implementation administration support operations.
- IT Industry Accredited and related certificate e.g. CISSP CEH CISM ITIL CCNA CCNP
- Ability to write and present concise wellorganized reports and speeches in language appropriate either to fellow professionals or laymen. Some command of Arabic is useful but not requirement
Through knowledge of Information Security Standards NIST ISO 27001 - SOC operations
- Information Security Audits
- This position is offered to Saudi National Candidates.
Remote Work :
No