صاحب العمل نشط
حالة تأهب وظيفة
سيتم تحديثك بأحدث تنبيهات الوظائف عبر البريد الإلكترونيحالة تأهب وظيفة
سيتم تحديثك بأحدث تنبيهات الوظائف عبر البريد الإلكتروني1. Design, Implement & maintain Cloud Security Measures for public/private Cloud Infrastructure Platforms. This includes Securing Virtual Machines, storage Systems, Networks or Cloud Resources.
2. Develop and maintain security baselines for all information systems and ensure regular maintenance and update of all baselines inventory bank wide.
3. Perform regular baseline scans or reviews as applicable to ensure compliance with the developed security baselines and follow up on mitigating the identified gaps/findings
4. Support the implementation of the different security projects and initiatives through defining the necessary security requirements in full alignment with the security policies and industry requirements.
5. Contribute to the design and implementation of security controls & technologies including but not limited to firewalls, intrusion detection/prevention systems, access controls and cryptographic mechanisms to strengthen the bank security posture
6. Conduct comprehensive reviews for security controls & configurations in alignment with Banks’ policy, compliance & regulation mandates and industry best practices
7. Effectively participate in the change and release management process to ensure adequate security controls are applied before go-live
8. Review and approve access control requests over different technology platforms/ and network security infrastructure to ensure adequate application of the approved security policies (e.g., Firewall rules change review).
9. Participate in the new server provisioning process to ensure conducting the needed security checks and ensure closure of any identified gaps before production deployment.
10. Ensure proper management and enforcement of privileged accounts over different technology layers (Operating System, Database, Application) including account designation, and implementation of privileged access control requirements.
11. Review and approve privileged access related requests including but not limited to (generic accounts creation, PAM access, access to existing accounts, etc.).
12. Assess and provide recommendations for IT & Cyber security policy deviation requests and ensure proper tracking of the same.