23 Cryptography jobs in the United Arab Emirates

Senior Protocol Engineer (Distributed Systems, Blockchain Cryptography)

TechBiz Global GmbH

Posted today

Job Viewed

Tap Again To Close

Job Description

At TechBiz Global , we are providing recruitment service to our TOP clients from our portfolio. We are currently seeking a Senior Protocol Engineer to join one of our clients' teams . If you're looking for an exciting opportunity to grow in a innovative environment, this could be the perfect fit for you.

You’ll be leading the design and development of next-generation consensus models, building secure and scalable EVM systems, and mentoring a world-class engineering team.

What You’ll Do

  • Lead the development of EVM-based systems and blockchain infrastructure.

  • Design and implement Proof of Stake and other consensus models .

  • Build and optimize smart contract platforms and tooling .

  • Collaborate with leadership to define technical strategy and roadmap.

  • Mentor engineers, fostering a culture of innovation and excellence.

  • Drive decentralization and scalability improvements.

This advertiser has chosen not to accept applicants from your region.

Binance Accelerator Program - FPGA Cryptography Engineer (ECDSA/ECC)

New
Dubai, Dubai Binance

Posted today

Job Viewed

Tap Again To Close

Job Description

Binance is the global blockchain company behind the world’s largest digital asset exchange by trading volume and users, serving a greater mission to accelerate cryptocurrency adoption and increase the freedom of money.

Are you looking to be a part of the most influential company in the blockchain industry and contribute to the crypto-currency revolution that is changing the world?

About Binance Accelerator Program

Binance Accelerator Program is a concise fixed-term program designed for Early Career Talent to have an immersive experience in the rapidly expanding Web3 space. You will be given the opportunity to experience life at Binance and understand what goes on behind the scenes of the worlds’ leading blockchain ecosystem. Alongside your job, there will also be a focus on networking and development, which will expand your professional network and build transferable skills to propel you forward in your career. Learn about BAP Program

Who may apply

Current university students and recent graduates.

About The Team

Join the Cryptographic Tech Team at Binance and be at the forefront of pioneering advancements in cryptographic technology! We research the latest cryptographic protocols and encryption primitives, implementing them in our products to enhance user asset security, on-chain privacy, and exchange transparency. Make a significant impact in the world of cryptography with us.

Responsibilities
  • Design and implement ECDSA (secp256k1) signature and verification on FPGA.
  • Develop and optimize large integer arithmetic modules (modular addition, subtraction, multiplication, inversion).
  • Implement scalar multiplication for elliptic curves with efficient coordinate systems and precomputation.
  • Integrate random number generation modules (TRNG or deterministic RFC6979) to ensure security.
  • Perform timing closure, performance optimization, and resource utilization optimization on FPGA platforms.
  • Apply side-channel countermeasures (constant-time logic, masking, randomization).
  • Deploy the FPGA design on AWS FPGA instances (F1/F2) and expose APIs for host applications.
  • Collaborate with software/cryptography teams to ensure correctness, compliance, and performance.
Requirements
  • Master’s degree or higher in Electrical Engineering, Computer Engineering, Cryptography or related field.
  • 3+ years FPGA/ASIC design experience, strong proficiency in Verilog/VHDL/SystemVerilog
  • Solid understanding of elliptic curve cryptography (ECC), especially ECDSA and secp256k1.
  • Familiarity with modular arithmetic algorithms (e.g., Montgomery multiplication, Barrett reduction).
  • Experience with FPGA toolchains such as Xilinx Vivado/Vitis or Intel Quartus.
  • Knowledge of clock domain crossing (CDC), timing closure, and high-speed interfaces (AXI/PCIe/DDR).
  • Awareness of hardware security principles and side-channel attack mitigation.
  • Experience deploying designs on cloud FPGA (AWS F1/F2) or similar platforms is a plus.
  • Strong problem-solving, debugging, and documentation skills.
Preferred Qualifications
  • Prior FPGA implementations of cryptographic algorithms (AES/SHA/ECC).
  • Publications or contributions in hardware security / cryptographic hardware design.
  • Experience with blockchain, fintech, or IoT security applications.
  • Familiarity with software integration (Linux drivers, PCIe DMA, host APIs).
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Senior Manager - Information Security

New
Dubai, Dubai Qataryello

Posted today

Job Viewed

Tap Again To Close

Job Description

Our client is a well-established financial services organisation in Jeddah.

The Senior Manager - Information Security will:

  • Support the CISO in developing and executing the information security strategy and roadmap
  • Contribute to long term planning and act as a key advisor on technical risks
  • Serve as acting CISO as and when required
  • Evaluate and recommend security technologies, tools and methodology ensure the organisation complies with SAMA cybersecurity framework and NCA
  • Lead technical input for audits and regularities reviews
  • Oversee security monitoring, threat and vulnerability management activities
  • Lead incident response efforts
  • Collaborate with IT, compliance, audit and other business unit
  • Report Information Security KPIs and metrics to executive management
  • Represent the Information Security function internally and externally as require

The Senior Manager - Information Security will be/have:

  • A Bachelor's or Master's degree in Information Technology, Computer Science or other relevant fields of study
  • 6+ years of experience in Information Security, ideally within the Banking/Financial Services sector
  • Expertise in information security architecture and engineering
  • Strong understanding of Information Security frameworks such as ISO2700
  • Relevant certifications such as CISSP, CISM, CCISO, etc. would be preferred
  • Excellent knowledge of Saudi regulatory requirements (SAMA, NCA, etc.)
  • Track record in designing secure systems and leading cyber security initiatives
  • Strong project management skills
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security - Specialist (Operations)

New
Sharjah, Sharjah GSS Group

Posted today

Job Viewed

Tap Again To Close

Job Description

Overview

The Information Security - Specialist will report directly to the Information Security Manager and will be responsible for implementing and managing security measures to protect the Bank's information assets. This role focuses on proactive threat detection, incident response, and vulnerability management across all technology domains, including endpoints and cloud environments. In collaboration with IS management, the Specialist will identify gaps in existing information security policies, standards, guidelines, and procedures, recommending updates to ensure alignment with regulatory requirements, industry best practices, and leading security standards.

JOB CONTEXT/ DIMENSIONS The IS Specialist will be responsible for overseeing security technologies like Cloud Security, DLP, Kubernetes, API security, SIEM and EDR, and ensuring compliance with standards and policies. Responsibilities include managing incident response, performing risk assessments, and optimizing security tools across cloud and network environments. The position requires collaboration with internal teams and external stakeholders to enhance security posture and mitigate threats.

Responsibilities
  • Assist in developing and implementing the information security strategy and roadmap across all security technology domains.
  • Research and analyze security standards, systems, and authentication protocols, providing recommendations to IS management.
  • Review architectural security designs, Data flow and offer recommendations for approval by IS management.
  • Enforce security policies and control across cloud environments to ensure a secure infrastructure.
  • Manage and optimize CSPM tools to continuously monitor and enforce security best practices within cloud environments like Azure.
  • Lead cloud incident response efforts, investigating and addressing threats in real-time to mitigate potential security risk.
  • Lead the ongoing management of DLP technologies to protect sensitive data from unauthorized access and leakage.
  • Regularly review and update DLP policies to reflect changes in business needs, technologies, and regulatory requirements.
  • Identify and assess security risks in APIs and Kubernetes by evaluating access control, misconfigurations, and vulnerabilities.
  • Enforce security policies and controls for APIs and Kubernetes.
  • Oversee the management, optimization, and tuning of the SIEM platform to ensure effective security incident monitoring.
  • Conduct deep-dive investigations into security alerts and collaborate with teams to resolve incidents efficiently.
  • Conduct regular security audits and reviews to ensure compliance with internal policies and industry standards.
  • Manage the deployment and operational effectiveness of EDR solutions to monitor, detect, and respond to endpoint threats.
  • Lead incident response for security breaches, including investigation, containment, eradication, and recovery.
  • Provide post-incident analysis, identify lessons learned, and improve future response strategies.
  • Monitor the bank’s networks for security breaches and investigate violations as they occur.
  • Advise IS management on emerging security trends and best practices, assist in updating security policies and procedures, and support departments in investigating breaches and pursuing disciplinary or legal actions as needed.
  • Contribute to team efforts by accomplishing related results as needed.
  • Perform other duties as may be assigned by IS management.
Independence of Operation

• Work within framework of bank’s information security policies, standards, guidelines and procedures as applicable.

• Work accomplishments will be reviewed by the Information Security Manager.

Education and Qualifications
  • Bachelor’s degree in computer science, Network/ Cyber Security or related information technology field.
  • Professional / Technical Qualifications / Diplomas: Platform specific (e.g., SIEM/ Networking/ Operating System) certifications.
  • Security (e.g. SANS/ ISC2 / CEH/ CISSP) certifications
Experience

8 - 10 years’ experience in Information Security or related field.

Role Competencies

• In-depth knowledge and understanding in information security and technology infrastructure, ensuring robust protection of systems and applications.

• Expertise in enforcing cloud security policies, IAM configurations, and data protection practices to ensure a secure infrastructure.

• Proficient in managing and optimizing CSPM tools to continuously monitor and enforce security best practices.

• Experienced in reviewing and enhancing security configurations and architectures to align with industry best practices and compliance requirements.

• Proficient in managing API and Kubernetes security policies, including implementing posture management, access controls, encryption, and continuous monitoring to ensure a secure environment.

• Skilled in conducting thorough vulnerability assessments and comprehensive risk analyses, prioritizing risks and implementing remediation strategies to secure systems.

• Proficiency in configuring and managing DLP tools, data classification, policy enforcement, risk assessment, compliance knowledge, and integrating with security systems to prevent unauthorized data loss.

• Skilled in configuring, optimizing, and managing Security Information and Event Management (SIEM), EDR, and DAM platforms for real-time threat detection and effective incident response.

• Committed to enhancing organizational security posture through ongoing monitoring, assessment, and optimization of security tools and processes.

• Demonstrates innovative thinking by exploring alternative approaches and developing conceptual frameworks to address complex security challenges.

• Possesses strong communication skills, capable of conveying complex security concepts to senior non-technical stakeholders in clear, jargon-free language.

• Adept at managing multiple concurrent projects, effectively prioritizing tasks to meet organizational demands and deadlines.

#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Principal Information Security Consultant

New
Abu Dhabi, Abu Dhabi CyberGate

Posted today

Job Viewed

Tap Again To Close

Job Description

Principal Information Security Consultant

Abu Dhabi, United Arab Emirates | Posted on 08/18/2025

CyberGate Defense, an IHC company, is a leading force in cybersecurity innovation, dedicated to enhancing the digital resilience of organizations across the region. Established with the mission to fortify the region’s cybersecurity landscape, CyberGate harnesses extensive expertise to tackle complex information security and operational challenges.

Our commitment to driving progress is reflected in our broad range of cybersecurity services and solutions. By leveraging cutting-edge, disruptive technologies, we deliver transformative, human-centric security solutions that safeguard organizations and empower them to navigate a secure and dynamic digital future.

With a wealth of in-house knowledge, CyberGate Defense is well-equipped to address the most intricate cybersecurity issues. We strive to make digital transformation secure, accessible, and beneficial, ensuring that organizations throughout the region thrive in an increasingly interconnected digital world.

Job Description

Job Description:

The Principal Information Security Consultant shall be the primary technical liaison between our clients and our internal security teams. In this critical role, the consultant will leverage their deep understanding of information security concepts and technical expertise to bridge the gap between client needs and the specialized teams, including Security Operations Center (SOC), Vulnerability Assessment and Penetration Testing (VAPT), Azure Security, and Governance, Risk, and Compliance (GRC). This is an individual contributor role with no direct reports or managerial responsibilities.

Key Responsibilities:

  1. Act as the primary point of contact for clients, translating their information security requirements and concerns into actionable tasks for CyberGate's internal teams.
  2. Provide expert guidance and consultation to clients on a wide range of information security topics, including threat landscapes, best practices, and emerging technologies.
  3. Collaborate closely with SOC teams to understand incident response activities, provide client-facing updates, and help clients interpret security alerts and reports.
  4. Work with VAPT teams to articulate client scope, interpret vulnerability reports, and advise clients on remediation strategies and prioritize findings.
  5. Liaise with Azure security specialists to understand cloud security posture, discuss architecture, and provide recommendations to clients for securing their Azure environments.
  6. Engage with GRC teams to ensure client compliance needs are met, assist in policy development, and help clients navigate regulatory frameworks.
  7. Conduct technical deep-dives and provide high-level architectural insights to both clients and internal teams to facilitate effective security solutions.
  8. Develop and deliver clear, concise, and technically accurate documentation, reports, and presentations for clients and internal stakeholders.
  9. Stay up-to-date with the latest information security trends, vulnerabilities, and technologies to provide proactive and informed advice.

Qualifications:

  • Extensive experience in information security, with a strong foundational understanding across various domains (e.g., network security, application security, cloud security, incident response, compliance).
  • Demonstrable technical proficiency to effectively communicate and collaborate with specialized security teams (SOC, VAPT, Azure, GRC).
  • Proven ability to translate complex technical information into understandable terms for both technical and non-technical audiences.
  • Exceptional client-facing communication and interpersonal skills, with a track record of building strong client relationships.
  • Strong analytical and problem-solving abilities, with a keen eye for detail.
  • Ability to work independently and manage multiple client engagements simultaneously in a fast-paced environment.
  • Relevant industry certifications (such as CISSP, CISM, CISA, CCSP) are highly desirable.

Education:

Bachelor’s degree in computer science, Information Security, or a related technical field. A master’s degree is a plus.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Manager Information Security RR-0269494

New
Dubai, Dubai DXC Technology Inc.

Posted today

Job Viewed

Tap Again To Close

Job Description

Manager Information Security RR- page is loaded# Manager Information Security RR- locations: ARE - DU - DUBAItime type: Full timeposted on: Posted Todayjob requisition id: **Job Description:***Essential Job Functions:** • Manage a team of security professionals, assigning tasks and monitoring their progress. • Implement and enforce security policies and procedures, ensuring staff adherence. • Monitor security incidents and vulnerabilities, responding promptly to mitigate risks. • Collaborate with other departments to address security concerns and implement security solutions. • Assist in compliance efforts related to security, ensuring the organization's adherence to relevant regulations. • Participate in incident response and investigation, identifying security breaches and implementing corrective actions. • Provide guidance on security technologies and practices, contributing to security strategy. • Prepare and deliver security reports to senior management and relevant stakeholders. **Basic Qualifications:** • Bachelor's degree in a relevant field or equivalent combination of education and experience • Typically, 7+ years of relevant work experience in industry, with a minimum of 3 years in a similar role • Proven experience in information security management • Proficiencies in risk management, compliance, and security technologies • A continuous learner that stays abreast with industry knowledge and technology **Other Qualifications:** • Advanced degree in a relevant field is a plus • Relevant certifications such as CISSP, CISM, or CISA are a plusAt DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.**Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available** ***.***DXC Technology (NYSE: DXC) helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates. Learn more about how we deliver excellence for our customers and colleagues at . #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Chief Information Security Officer - Product Line

New
Dubai, Dubai Binance

Posted today

Job Viewed

Tap Again To Close

Job Description

Binance is a leading global blockchain ecosystem behind the world’s largest cryptocurrency exchange by trading volume and registered users. We are trusted by over 280 million people in 100+ countries for our industry-leading security, user fund transparency, trading engine speed, deep liquidity, and an unmatched portfolio of digital-asset products. Binance offerings range from trading and finance to education, research, payments, institutional services, Web3 features, and more. We leverage the power of digital assets and blockchain to build an inclusive financial ecosystem to advance the freedom of money and improve financial access for people around the world.

The product line Chief Information Security Officer, reporting to the Global Chief Security Officer, aims to develop and implement a comprehensive information security strategy for one of the leading product lines in the Binance product suite. The role will also ensure that the IT Governance and Security Risk Management Systems align to international best practices and adhere to regulatory requirements.

Responsibilities
  • Experience and expertise in Defi security including blockchain, smart contracts, wallet security, and random number generation.
  • Hands‑on implementation of the IT Security Risk Management function.
  • Lead Security Risk Management with all stakeholders as per Security Risk Framework.
  • Work as part of the three lines of defense model to ensure funds, data and systems are secure.
  • Ensure all security obligations for governance, regulatory and compliance matters are delivered.
  • Assist the delivery of the internal and external audits related to Technology and Security.
  • Drive cyber threat & vulnerability management/penetration tests.
  • IT security risk management for new projects and/or any integration with third party vendors.
  • Manage Third party integrations risk to ensure alignment with security standards and SLAs.
  • Security incident management, including prompt reporting to senior management & other teams.
  • Facilitate continual alignment to regulatory compliance obligations and international standards.
Requirements
  • Track record of international company experience and cyber security in a regulatory context.
  • A combination of senior management and deep cyber security experience is mandatory.
  • Security community contributor either through published material or international conferences.
  • Demonstrable experience in a global team with a rich multicultural fast paced environment.
  • 10+ years of experience in security & technology compliance in a global firm.
  • Bachelor's degree or higher in information technology, cyber security or related field.
  • Track record in self motivated leadership and excellent communication and listening skills.
  • Proven management of cyber security operations with hands‑on implementation skills.
  • Delivery of best practices for international data privacy and information security frameworks.
  • NIST Cybersecurity & Privacy Framework, ISO 27001/ISO 27701, CIS and PCI-DSS.
  • Must seek excellence by default and show a passion for collaboration and team achievement.
  • Demonstrable experience delivering effective business and technical security solutions.
  • A passion for the latest cyber security trends and emerging threats is essential.
Why Binance
  • Shape the future with the world’s leading blockchain ecosystem
  • Collaborate with world‑class talent in a user‑centric global organization with a flat structure
  • Tackle unique, fast‑paced projects with autonomy in an innovative environment
  • Thrive in a results‑driven workplace with opportunities for career growth and continuous learning
  • Competitive salary and company benefits
  • Work‑from‑home arrangement (the arrangement may vary depending on the work nature of the business team)

Binance is committed to being an equal opportunity employer. We believe that having a diverse workforce is fundamental to our success.

By submitting a job application, you confirm that you have read and agree to our Candidate Privacy Notice .

#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cryptography Jobs in United Arab Emirates !

Interview Questions for Information Security Analyst

New
Dubai, Dubai OnlineBestAds

Posted today

Job Viewed

Tap Again To Close

Job Description

Login for faster access to the best deals. Click here if you don't have an account.

Interview Questions for Information Security Analyst Jun 25th, 2025 at 05:44 Learning Dubai 10 views Reference: 5123 Contact us Location: Dubai Price: Contact us

Interview Questions for Information Security Analyst roles often focus on key areas like risk management, network security, incident response, and vulnerability assessment. Candidates may be asked about common security tools, threat detection techniques, encryption methods, and how they would handle real-world security incidents. Preparing for these questions helps build confidence and demonstrates the technical knowledge and problem-solving skills required for a successful career in information security.

Send a message #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

CSO - Information Security Assistant Manager - Abu Dhabi Branch

New
Abu Dhabi, Abu Dhabi Intesa Sanpaolo Group

Posted today

Job Viewed

Tap Again To Close

Job Description

CSO - Information Security Assistant Manager - Abu Dhabi Branch

Date: Sep 10, 2025

Location:

Abu Dhabi, AE

Information Security Senior Assistant Manager operates in close cooperation with the local Information Security Officer (ISO) and with the Head Office teams to ensure the definition of the objectives for the Cybersecurity and Business Continuity Programs and monitors compliance with such objectives.

Specific accountabilities of the Information Security Assistant Manager in support of the local ISO:

  • Responsible for the oversight of the state of information security and cybersecurity and provides periodic reports (at least annually) on the state of information security to Top management
  • Adopt, implement and update Cybersecurity policies, rules, processes and procedures in line with Head Office regulatory Framework
  • In reporting to the Top Management, considers to the extent applicable the confidentiality of Nonpublic Information and the integrity and security of Information Systems, the cybersecurity policies and procedures, the material cyber risks, the overall effectiveness of information security and cybersecurity program and possible material cybersecurity events involving the branch
  • Work strategically with Head Office to ensure that all aspects of information security and cybersecurity are properly monitored and that security projects and tasks are properly coordinated
  • Perform continuous monitoring of Information Security and Cybersecurity programs to ensure compliance with objectives, policies and procedures
  • Identify and evaluate changes in local regulations, as well as trends in the Information Security and Cybersecurity sector, such as new products, new attacks and new countermeasures for applicability inside the Branch environment
  • Ensure the local execution of Business Continuity activities, including periodical Business Impact Analysis, tests and reporting, in line with the Group model.
  • Work with information owners in business units to determine appropriate security objectives
  • Monitor network activity for malicious activity
  • Monitor and evaluates vulnerability reports, vendor hot-fixes, and vendor patches for applicability to deployed technologies
  • Monitor the process of creating, changing, or removing user access across all systems
  • Monitor the access control program. Ensure that all appropriate documentation pertaining to the recording of account creations, deletions, and permissions are correctly maintained and approved
  • responsible for the Cybersecurity and Business Continuity Training Programs
Required Experience

Previous experience in a similar role preferable.

Required Qualifications, Skills and Knowledge
  • Bachelor’s in computer science, Information Technology or related field;
  • Background in assuring high level of Information Security management and Business Continuity management in an organization;
  • IT/Info/Cyber Security risk management knowledge, including application risk classification and application control assessments;
  • Knowledge of financial industry products and related IT platform, a plus.
About us

We are the leading banking group in Italy and one of the Top Tier in Europe. Join us and be part of our successful story!

With over 20 million customers in Italy and abroad, we are a true engine of sustainable growth, with a strong commitment to the environment and a tangible impact on society. People are our driving force. We take care of them and foster an inclusive culture where everyone feels valued and empowered.

Join an international and innovative Group. Don't wait for the future, choose it!

#sharingfuture

We guarantee an inclusive and equal environment. We will consider all applicants regardless of race, religion, sexual orientation, gender identity, marital status, national origin, age, disability, or any other protected category in compliance to D.lgs. 198/2006, 215/03 and 216/03.

For the evaluation of the application, the data will be processed by Intesa Sanpaolo S.p.A. as Data Controller. We invite you to review the dedicated Privacy Information Notice for more details.

#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Network Security Engineer

New
Dubai, Dubai Jadeer

Posted today

Job Viewed

Tap Again To Close

Job Description

Secure the Future! We're hiringa network security engineer in the UAE marketon behalf of our client!

About Our Client:
Our client, a leading IT company in the UAE, is recognized for its cutting-edge technology solutions and commitment to cybersecurity excellence. They are seeking an experienced Network Security Engineer to enhance and maintain the security of their IT infrastructure and networks.

The Role:
As a Network Security Engineer , you will be responsible for safeguarding the company's network and IT infrastructure, ensuring that it operates securely and efficiently. You will design, implement, and monitor security solutions, preventing unauthorized access and responding to potential threats.

What You'll Do:

  • Design, implement, and manage network security solutions.
  • Monitor and analyze network traffic to detect security breaches or vulnerabilities.
  • Conduct security assessments, audits, and risk analysis.
  • Implement firewall, VPN, anti-virus, and intrusion detection/prevention systems.
  • Collaborate with IT teams to ensure seamless network operations.
  • Develop and enforce security policies and protocols.
  • Respond to and mitigate security incidents in a timely manner.
  • Provide reports on security status and make recommendations for improvements.

What We're Looking For:

  • A Bachelor's degree in Computer Science, Information Technology, or a related field.
  • Minimum of 5 years of experience in network security engineering or a similar role.
  • Expertise in firewalls, VPNs, IDS/IPS, and other security technologies.
  • Strong understanding of network protocols, IP routing, and network traffic analysis.
  • Excellent problem-solving skills with attention to detail.
  • Certifications such as CISSP, CCNP Security, or similar are a plus.

What's in It for You:

  • Competitive compensation package.
  • Opportunity to work on advanced cybersecurity projects.
  • Career growth and professional development opportunities.
  • A supportive and dynamic work environment.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cryptography Jobs