Conduct in-depth comprehensive security reviews of Network, system, application, and security tools configurations against established security standards (e.g., CIS Controls, NIST CSF, PCI DSS, NDMO, and NCA).
Identify and document deviations from security best practices and compliance requirements.
Recommend and implement remediation measures to address identified vulnerabilities.
Utilize vulnerability scanning tools to identify and prioritize security vulnerabilities within the IT environment.
Analyze vulnerabilities, assess potential risks, and recommend appropriate mitigation strategies.
Track and report on vulnerabilities throughout the remediation process.
Create detailed reports on configuration reviews, vulnerability assessments, and remediation efforts.
Clearly and concisely communicate security findings and recommendations to technical and non-technical audiences.
Work effectively with cross-functional teams including IT operations, engineering, and management.
Develop and implement security policies, procedures, and guidelines.
Proactively communicate security risks and best practices to stakeholders.
Participate in GRC activities and contribute to the development of security artifacts.
Analyze security logs and events to identify suspicious activity and potential threats.
Implement and maintain robust security controls to protect sensitive data, including encryption, access control, and intrusion detection/prevention systems.
Conduct regular vulnerability assessments and penetration testing to identify and remediate security weaknesses.
Develop and implement security policies, procedures, and guidelines.
Stay up-to-date on the latest cyber security threats and trends, proactively updating security measures to remain ahead of emerging risks.
Collaborate with other security and IT teams to ensure a comprehensive and coordinated security posture.
Document security activities and findings, and participate in reporting to management.
Lead the design and implementation of robust security architectures, aligning with industry best practices and organizational needs.
Design and implement security controls, including access management, network segmentation, data encryption, and intrusion detection/prevention systems.
Collaborate with internal teams (e.g., sales, engineering) to ensure aligned and successful client engagements.
Assist the sales team throughout the sales cycle, from initial contact to closing the deal.
Prepare proposals, quotes, and presentations tailored to specific customer needs.
Participate in customer meetings and negotiations.
Stay up-to-date on industry trends and competitor offerings.
Qualifications
Bachelor's degree in Computer Science, Information Security, or related field (Master's degree preferred).
Minimum 6-8 years of experience in a cyber security role, with at least 3 years in a senior or lead consolation position.
Minimum of 4 years as a Consultant
Proven experience in conducting configuration reviews based on data standards (e.g., HIPAA, PCI DSS, GDPR, NDMO,NCA).
In-depth knowledge of security principles, methodologies, and best practices (e.g., NIST, (Cybersecurity ,GRC, BCM ,Data) Framework, CIS Controls).
Experience with security tools and technologies, including SIEM, NAC, vulnerability scanners, and penetration testing tools.
Excellent analytical and problem-solving skills.
Strong communication and interpersonal skills, with the ability to work effectively with both technical and non-technical audiences.
Ability to work independently and as part of a team.
Highly motivated and results-oriented with a strong work ethic.
إخلاء المسؤولية: د.جوب هو مجرد منصة تربط بين الباحثين عن عمل وأصحاب العمل. ننصح المتقدمين بإجراء بحث مستقل خاص بهم في أوراق اعتماد صاحب العمل المحتمل.
نحن نحرص على ألا يتم طلب أي مدفوعات مالية من قبل عملائنا، وبالتالي فإننا ننصح بعدم مشاركة أي معلومات شخصية أو متعلقة بالحسابات المصرفية مع أي طرف ثالث. إذا كنت تشك في وقوع أي احتيال أو سوء تصرف، فيرجى التواصل معنا من خلال تعبئة النموذج الموجود على الصفحة اتصل بنا