249 Cryptography jobs in the United Arab Emirates

Cryptography Growth Strategist

Ajman, Ajman beBeeMarketing

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description

Binance is a leading global blockchain ecosystem and cryptocurrency infrastructure provider whose suite of financial products includes the world's largest digital-asset exchange. Our mission is to accelerate cryptocurrency adoption and increase the freedom of money.

  • Develop lifecycle marketing strategies that increase customer engagement, satisfaction, and revenue.
  • Create and manage customer segmentation and targeting strategies to optimize the customer journey.
  • Collaborate with cross-functional teams to facilitate integrated marketing strategies.
  • Develop a testing and experimentation framework to improve campaign performance and customer experience.
  • Plan user growth strategies including event, campaign, and other marketing activities to achieve user growth.
  • Monitor and evaluate marketing campaigns and product growth through data analysis.
Requirements
  • Bachelor's degree in marketing, business, or related field.
  • 5+ years of experience in client lifecycle or related fields.
  • Strong understanding of trading customer behavior and segmentation.
  • Strong analytical skills and ability to use data for decision making.
  • Strong communication skills and ability to facilitate client managers.
  • Understanding of Binance products and services or similar exchange products.
  • Knowledge of cryptocurrency/blockchain-related terminologies and trends.
What We Offer
  • Part of the world's leading blockchain ecosystem with career development opportunities.
  • Work alongside diverse talent in an environment with learning and growth opportunities.
  • Tackle fast-paced projects.
  • Work in a global organization with international teams and a flat structure.
  • Competitive salary and benefits.
  • Flexible working hours and remote-first environment.
This advertiser has chosen not to accept applicants from your region.

Linux Cryptography And Security Engineer

AED120000 - AED240000 Y Canonical

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description

This is a unique opportunity to use your software engineering and cryptography skills to build and maintain the security foundation that enables Ubuntu and its users to operate securely and remain compliant to international information security standards such as FIPS 140-3 and Common Criteria. You will use your applied cryptography, Linux Security, and coding skills to enhance the Ubuntu distribution and work with organizations such as DISA and CIS to draft and implement security hardening benchmarks for Ubuntu.

As a member of the Security Hardening team you will work with and develop automation tooling to audit deployed systems for DISA-STIG and CIS benchmark compliance. You will interact with internal and external stakeholders to identify gaps in our frameworks, and develop new solutions to address these challenges. In this role you will have the opportunity to influence team and security culture, facilitate technical delivery, and help drive team direction and execution. Youll collaborate closely with Canonicals kernel team as well as the wider engineering organization to drive features impacting all Ubuntu users.

Day-to-day responsibilities

  • Collaborate with other engineers in the Security Hardening team to achieve and retain various Security certifications
  • Extend and enhance Linux cryptographic components (OpenSSL, Libgcrypt, GnuTLS, and others) with the features and functionality required for FIPS and CC certification
  • Collaborate with external security consultants to test and validate kernel and crypto module components
  • Work with external partners to develop security hardening benchmarks and audit + remediation automation for Ubuntu
  • Contribute to Ubuntu mainline and upstream projects to land solutions and benefit the community
  • Communication and collaboration within and outside Canonical to identify opportunities to improve our security posture, rapidly resolve issues, and deliver high-quality solutions on schedule

What we are looking for in you

  • Hands-on experience with low-level Linux cryptography APIs and debugging
  • Excellent software engineering fundamentals, including prior experience with C development, and the ability to demonstrate such
  • Hands-on experience with Linux system administration and shell scripting
  • Demonstrated knowledge of security and cryptography fundamentals + direct experience writing secure code and implementing best practices
  • Significant development experience working with open source libraries
  • Excellent verbal and written communications to enable efficient collaboration with internal and external partners in a remote-first environment

Additional Skills That You Might Also Bring

  • Prior experience working on FIPS/Common Criteria certified products and in-depth knowledge of the underlying standards
  • Prior experience working directly with DISA-STIG or CIS benchmarks, including related audit + remediation tooling (e.g. Compliance as Code)
  • Experience working directly with Linux Kernel
  • Prior experience with Python, OVAL (Open Vulnerability Assessment Language), and Ansible
  • History of contributions to open source projects

What we offer you We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.

  • Distributed work environment with twice-yearly team sprints in person - weve been working remotely since 2004
  • Personal learning and development budget of USD 2,000 per year
  • Annual compensation review
  • Recognition rewards
  • Annual holiday leave
  • Maternity and paternity leave
  • Employee Assistance Programme
  • Opportunity to travel to new locations to meet colleagues from your team and others
  • Priority Pass for travel and travel upgrades for long haul company event
This advertiser has chosen not to accept applicants from your region.

Senior Protocol Engineer (Distributed Systems, Blockchain Cryptography)

TechBiz Global GmbH

Posted today

Job Viewed

Tap Again To Close

Job Description

At TechBiz Global , we are providing recruitment service to our TOP clients from our portfolio. We are currently seeking a Senior Protocol Engineer to join one of our clients' teams . If you're looking for an exciting opportunity to grow in a innovative environment, this could be the perfect fit for you.

You’ll be leading the design and development of next-generation consensus models, building secure and scalable EVM systems, and mentoring a world-class engineering team.

What You’ll Do

  • Lead the development of EVM-based systems and blockchain infrastructure.

  • Design and implement Proof of Stake and other consensus models .

  • Build and optimize smart contract platforms and tooling .

  • Collaborate with leadership to define technical strategy and roadmap.

  • Mentor engineers, fostering a culture of innovation and excellence.

  • Drive decentralization and scalability improvements.

This advertiser has chosen not to accept applicants from your region.

Binance Accelerator Program - FPGA Cryptography Engineer (ECDSA/ECC)

Dubai, Dubai Binance

Posted today

Job Viewed

Tap Again To Close

Job Description

Binance is the global blockchain company behind the world’s largest digital asset exchange by trading volume and users, serving a greater mission to accelerate cryptocurrency adoption and increase the freedom of money.

Are you looking to be a part of the most influential company in the blockchain industry and contribute to the crypto-currency revolution that is changing the world?

About Binance Accelerator Program

Binance Accelerator Program is a concise fixed-term program designed for Early Career Talent to have an immersive experience in the rapidly expanding Web3 space. You will be given the opportunity to experience life at Binance and understand what goes on behind the scenes of the worlds’ leading blockchain ecosystem. Alongside your job, there will also be a focus on networking and development, which will expand your professional network and build transferable skills to propel you forward in your career. Learn about BAP Program

Who may apply

Current university students and recent graduates.

About The Team

Join the Cryptographic Tech Team at Binance and be at the forefront of pioneering advancements in cryptographic technology! We research the latest cryptographic protocols and encryption primitives, implementing them in our products to enhance user asset security, on-chain privacy, and exchange transparency. Make a significant impact in the world of cryptography with us.

Responsibilities
  • Design and implement ECDSA (secp256k1) signature and verification on FPGA.
  • Develop and optimize large integer arithmetic modules (modular addition, subtraction, multiplication, inversion).
  • Implement scalar multiplication for elliptic curves with efficient coordinate systems and precomputation.
  • Integrate random number generation modules (TRNG or deterministic RFC6979) to ensure security.
  • Perform timing closure, performance optimization, and resource utilization optimization on FPGA platforms.
  • Apply side-channel countermeasures (constant-time logic, masking, randomization).
  • Deploy the FPGA design on AWS FPGA instances (F1/F2) and expose APIs for host applications.
  • Collaborate with software/cryptography teams to ensure correctness, compliance, and performance.
Requirements
  • Master’s degree or higher in Electrical Engineering, Computer Engineering, Cryptography or related field.
  • 3+ years FPGA/ASIC design experience, strong proficiency in Verilog/VHDL/SystemVerilog
  • Solid understanding of elliptic curve cryptography (ECC), especially ECDSA and secp256k1.
  • Familiarity with modular arithmetic algorithms (e.g., Montgomery multiplication, Barrett reduction).
  • Experience with FPGA toolchains such as Xilinx Vivado/Vitis or Intel Quartus.
  • Knowledge of clock domain crossing (CDC), timing closure, and high-speed interfaces (AXI/PCIe/DDR).
  • Awareness of hardware security principles and side-channel attack mitigation.
  • Experience deploying designs on cloud FPGA (AWS F1/F2) or similar platforms is a plus.
  • Strong problem-solving, debugging, and documentation skills.
Preferred Qualifications
  • Prior FPGA implementations of cryptographic algorithms (AES/SHA/ECC).
  • Publications or contributions in hardware security / cryptographic hardware design.
  • Experience with blockchain, fintech, or IoT security applications.
  • Familiarity with software integration (Linux drivers, PCIe DMA, host APIs).
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Information Security

Dubai, Dubai VAM Systems

Posted today

Job Viewed

Tap Again To Close

Job Description

We are currently seeking an Information Security Manager (Operations) for our UAE operations. The ideal candidate will have:

  1. 7-10 years of experience in Information Security or a related field.
  2. Strong Operations knowledge within the banking sector, with hands-on experience in implementing and managing IS applications such as EDR, SIEM, DLP .
  3. Network-related experience with a background in Computer Science, Network, or Cyber Security , along with relevant certifications.

Terms & Conditions:

  • Joining timeframe: Maximum 4 weeks .
  • Remote work: No .
  • Employment type: Full-time .

This job is currently active and accepting applications.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security

Sharjah, Sharjah Dicetek LLC

Posted today

Job Viewed

Tap Again To Close

Job Description

Minimum Qualifications
  • An Engineering Degree, with 5+ Years experience in local / international Data Protection in BFSI.
  • Hands on experience in implementing data protection regulations.
  • Expertise in data protection laws and regulations (like CBUAE Consumer Data Protection, UAE Privacy Laws and applicable global data protection requirements).
  • Certification related to CIPP/E, CIPM, CIPT, CDPO, etc are preferred.
  • Strong knowledge of information Security, Data Protection and IT Systems.
Job Responsibilities
  • Assist in implementing Bank's policies and procedures in accordance with data protection laws and regulations (like CBUAE Consumer Data Protection, UAE Privacy Laws and applicable global data protection requirements) and advising the business on data protection and privacy matters.
  • Leading as required and maintaining cross-functional working groups to coordinate data protection efforts, including current projects and initiatives and regulatory awareness across the Bank.
  • Executing data protection and privacy monitoring and compliance testing reviews.
  • Evaluate the existing data protection framework and identify areas of non or partial compliance and rectify any issues.
  • Maintain an inventory of all personal data stored and data processing activities, including how and why the company collects, shares and uses personal data.
  • Work with the Contracts, Vendor Management and Compliance/Business departments to ensure that third-party suppliers contracts and operating-level agreements meet privacy requirements.
  • To support and promote a culture of awareness of data security / data protection throughout the bank.
  • Hold training with staff members across different business units who are involved in data handling or processing.
  • Work with and manage external vendors / auditors during assessments.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Specialist Information Security

AED120000 - AED240000 Y Tabreed

Posted today

Job Viewed

Tap Again To Close

Job Description

Position Title:
Specialist Information Security
JOB OBJECTIVE:
This role requires a technical expert with broad experience architecting and implementing information security technology solutions in a large enterprise environment. They must be able to act as a technical leader to support talent development and the building of high-performance teams. An effective collaborator, the Cybersecurity Specialist will work closely with key stakeholders including the Sr. Network Engineer, Systems Architect, and other teams to implement effective business solutions. With deep and broad background in information security and related services, the successful candidate will also be current with emerging best practices and service trends, particularly all aspects of cloud computing.

  • Security systems development, testing, analysis, and implementation
  • System vulnerability assessment and management
  • Response to security threats, attacks, and similar events
  • Development of threat prevention strategies
  • Coordinate & conduct black/white box security assessments with industry standard security tools
  • Regular generation of reports for executives and administrators
  • Comply with Health, Safety and Environment Policies (mandatory for all)
  • Risk Management (mandatory; line manager discretion)
  • Work independently on technical issues and recommend design solutions.
  • Demonstrate a solid understanding of infrastructure, virtualization, cybersecurity standards, and operating procedures.
  • Collaborate with other members of the cybersecurity team to develop new protocols, layers of protection, and other both proactive and defensive systems that stay one step ahead of cyber criminals.
  • Maintain security guidelines, procedures, standards, and controls documentation
  • Maintain a working knowledge of current cybercrime tactics.
  • Lead the analysis of the current technology environment to detect critical deficiencies and recommend solutions for improvement Conduct incident response analyses; develop.
  • Participate in and lead design sessions with Finning personnel as well as external parties.
  • Consult on application or infrastructure development projects to harmonize systems or infrastructure.
  • Assist with designing the governance activities associated with ensuring compliance with Information Security Policies.
  • Monitor and ensuring compliance to standards, policies, and procedures.
  • Define high-level migration plans to address the gaps between the current and future state, typically in sync with the budgeting or other planning processes.

KEY ACCOUNTABILITIES:
Description

  • Develop, support, and advance strategies, policies, programs, and projects designed to continually improve and enhance cyber and information security posture and resiliency
  • Oversee compliance with applicable laws, rules, and regulations related to cyber and information security
  • Work with the compliance team to establish policies/standards/guidelines to ensure systems record user activities and access to sensitive data in support of insider risk management
  • Develop and implement software security compliance program that takes a risk-based approach to ensure appropriate compliance to policies/standards/guidelines
  • Contribute to awareness and outreach efforts both internally and externally
  • Attend all regular, special, and emergency meetings regarding cyber and information security
  • Regularly review the operation of security controls and recommend changes designed to improve effectiveness and/or counter emerging risks
  • Make appropriate recommendations for security enhancements to the line manager or any external vendor providing services including tools, technologies, services, policies, procedures, and other areas as needed
  • Lead efforts to evaluate and select vendors for security assessments, penetration testing, and other similar security services
  • Direct and oversee the evaluation of security tools and make acquisition recommendations to the IT Security Manager
  • Manage budgets, maintain financial forecasts, develop, and present business cases
  • Establish objectives and milestones and manage activities to deliver high-quality results within budget and schedule
  • Other duties and obligations as assigned by the line manager
  • Work with multiple stakeholders to identify areas for cyber risk reduction on the IT Infrastructure and OT systems.
  • Lead the evaluation of the potential impact of implementing difference cyber risk reduction methods (i.e., cyber security controls) with in the IT infrastructure.
  • Act as the primary interface with the Tabreed stakeholders to architect the defensive model and implement cyber security controls across Tabreed IT & OT systems for desired risk reduction.

Assess Current State and Areas for Risk Reduction:

  • Lead the conduct of a cyber-security self-assessment initiatives based on international standard, national standards, and state of practice.
  • Assess the Tabreed's defensive strategy and the implementation of the cyber security program.
  • Provide an evaluation on current milestone delivery and regulatory compliance.
  • Lead the development of a corrective action plan for achieving desired risk reduction and maturing program elements.

Risk Reduction Strategy Development:

  • Lead the development of a risk reduction strategy for the protection of Tabreed critical systems and associated critical digital assets (CDAs).
  • Lead the development of a risk management strategy to include a cyber security control implementation strategy for effective and sustainable risk reduction.
  • Assist in establishing key performance indicators to monitor changes in cyber risk.
  • Communicates with senior leadership on cyber security strategic issues and current risks.
  • Act as a liaison with the UAE regulatory authority, to validate cyber security performance meets or exceeds regulatory expectations for protection against the design basis threat.

Leading Solutions Design:

  • Leads the creation of deliverables related to design and analysis of technology solution to ensure that solution meet business and operation needs.
  • Design, Build, Implement and support an Enterprise-class security systems.
  • Design security architecture elements to mitigate threats as they emerge.
  • Create solutions that balance business requirements with information and cybersecurity requirements

Risk Management:

  • Analyse current risks and identify potential risks in responsibility
  • Report the risk tailored to the relevant audience
  • Build risk awareness amongst team by providing support and training

Framework:

  • Follow the international framework designed to standardize the selection, planning, delivery, and maintenance of IT services within a business

Technology Research:

  • Strategic planning (medium and long term) based on company objectives to keep in line with new developments in IT
  • Research new technology to determine what would best support their organization in the future

JOB REQUIREMENTS:
Minimum Qualifications:

  • Bachelor's degree holder in Computer Science/Engineering or equivalent Knowledge
  • Broad knowledge across all areas of the Technology Architecture domain including Cloud Computing (IaaS, PaaS, AWS, Azure etc.) Data Center, Data Storage Technologies, Virtualization, server platforms (Windows and Linux), Desktop, mobility solutions, systems monitoring/management, data protection, high availability/clustering, network (WAN/LAN/WLAN etc.), Security (Firewall, IDS/IPS, VPN etc.)
  • Strong proficiency in Incident Management and Response.
  • Experience in security device management and SIEM.
  • In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
  • Experience in threat management and threat intelligence.
  • Good understanding of Infrastructure Security and its impact on Security Operations, Vulnerabilities, Reporting, Analytics and Monitoring.
  • Ability to develop a comprehensive understanding of Finning's business, market and industry and relate that knowledge to identified operations and IT-related risks
  • Familiar with the basic principles of organizational change management, and understanding of how to apply these principles
  • Ability to understand the long-term ("big picture") and short-term perspectives of situations
  • Ability to estimate the financial impact of risk mitigation alternatives
  • Ability to quickly comprehend the functions and capabilities of new technologies
  • Knowledge of many, if not most, aspects of information security architecture Understanding of network and enterprise architecture Certifications: CISSP or CISM , Network and security , Microsoft Azure Administrator Certification and Industrial Cybersecurity

Minimum Experience:

  • Minimum 5 years' experience in Information Technology (IT) & Operational Technology (OT) Cyber security
  • Hands-on experience running mission-critical cybersecurity operations
  • Proven experience building a service-oriented organization and driving or promoting a service delivery model
  • Exhibit excellent analytical skills and the ability to manage multiple projects under strict timelines as well as the ability to work well in a demanding, dynamic environment and meet overall objectives
  • Project management skills: financial/budget management, scheduling, and resource management
  • Experience with contract and vendor negotiations, and expertise in negotiating complex contracts and managing vendors, including design, and tracking of Service Level Agreements (SLAs)
  • High level of personal integrity as well as the ability to professionally handle confidential matters and to show an appropriate level of judgment and maturity
  • Self-starter, accountability, and the ability to work with little supervision
  • Limited travel to project sites
  • Due to nature of 24/7 operation may be required to work after hours or on weekend
  • Flexibility to work in shifts as required
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cryptography Jobs in United Arab Emirates !

Information Security Officer

AED30000 - AED60000 Y BOST Trading

Posted today

Job Viewed

Tap Again To Close

Job Description

Full job description

The Information Security Officer is responsible for developing and maintaining the hospital's information security framework. The role involves overseeing security operations, ensuring compliance with Abu Dhabi Healthcare Information and Cyber Security Standard (ADHICS), and contributing to key projects such as SOC (Security Operations Center) implementation, SIEM, and Data Loss Prevention (DLP) systems.

Essential Job Functions and Key Accountabilities:

  • Develop, implement, and monitor a strategic, comprehensive enterprise information security and IT risk management program.
  • Execute periodic and ad-hoc compliance checks and cyber risk assessments in alignment with mandated cybersecurity policies and guidelines.
  • Recommend and implement remedial actions for non-compliance issues.
  • Contribute to Risk Management Framework documentation and activities (e.g., system life-cycle support plans, operational procedures, maintenance training materials).
  • Participate in risk governance processes to evaluate and address security risks.
  • Lead and Monitor the implementation of SOC and SIEM solutions.
  • Oversee DLP strategies and governance.
  • Perform regular audits, security scans, and risk assessments.
  • Define and enforce security protocols, policies, and procedures.
  • Ensure compliance with UAE regulations and international standards.
  • Conduct cybersecurity awareness training for staff.
  • Collaborate with IT and clinical departments to integrate security into all systems and workflows.
  • Investigate and respond to security incidents and breaches.

Competency Standards

Clinical/Technical Competencies:

  • Cyber security and privacy principles (confidentiality, integrity, availability).
  • Networking protocols and network security threats.
  • Laws, regulations, and ethics related to cyber security.
  • Information classification and compromise procedures.
  • Security scanning, vulnerability assessments and penetration testing.
  • PHI (Personal Health Information) data protection standards.
  • Security architecture, including topology, protocols, and components.
  • Experience with SIEM tools.
  • DLP platform experience
  • Familiarity with Firewalls, IDS/IPS, and Endpoint Protection.
  • Microsoft Azure and Office 365 security solutions.
  • ADHICS implementation experience preferred.

Qualification

Bachelor's Degree in Information Technology, Computer Science, or Cybersecurity.

Diploma holders with strong relevant experience may be considered.

Job Types: Full-time, Fresher

Pay: From AED2,500.00 per month

This advertiser has chosen not to accept applicants from your region.

Information Security Manager

AED90000 - AED120000 Y Cleveland Clinic Abu Dhabi

Posted today

Job Viewed

Tap Again To Close

Job Description

About the Company

Responsible for the technical strategic design, implementation, and operational management of the enterprise data security infrastructure in the support and enforcement of organization policies and priorities. This person will provide leadership to ensure sustainable, high quality delivery of technical security systems and related tools to safeguard the availability and integrity of all CCAD data.

About the Role

Reports directly to Executive Director, Technology & Development. Reports indirectly to N/A. Head Count Managed Approx. 2. Number of Direct Reports Approx. 0. Number of Indirect Reports Approx. 2. Financial Accountability N/A.

Responsibilities

  • Responsible for the technical strategic design, implementation, and management of enterprise security systems to include but not limited to firewalls, intrusion detection systems, application security integration, secure remote access, data encryption, identity management and access provisioning, user and system auditing and reporting, HIPPA, VPN, SSL, smart card/token access systems, wireless device security , VOIP security, workstation end point patch management, anti-spam, anti-virus, anti-malware/spyware systems and management tools, and new technology and regulatory requirements potentially impacting the security posture of CCAD.
  • Provide technical oversight of vended services covering these areas of responsibility and proactively plan for future growth and technological innovations that effect the hospital's environment related to these knowledge areas.
  • Work closely with CCAD customer groups to ensure that service levels are being met while utilizing resources efficiently and effectively.
  • Manages both full time staff and contract labor to adequately design, implement, and support technical solutions.
  • Provide guidance, coaching, and formal counseling to CCAD and contract staff to include but not limited to training, appraisals, corrective action, and employment/contract termination.
  • Ensure performance management standards are being met and services are being delivered according to set agreements and/or contracts.
  • Performs other duties as assigned.

Qualifications

  • Education: Bachelor's degree or technical degree in Information Technology or a related field is preferred.
  • Experience: Minimum of 6 (six) years of professional job experience working with large organizations in support of the technical design, implementation, and management of enterprise data security and associated technologies. Minimum of two (2) years of experience supporting technical environments in a large U.S. based Hospital supporting a user base of more than 5000 users. Demonstrated strong background in the development and supervision of fulltime and contract IT professionals.
  • Certification and Licensure: CISSP is required.
  • Professional Membership: N/A.

Required Skills

  • Proficiency with Microsoft Office suite.
  • Ability to speak and write in English is required.

Preferred Skills

  • Demonstrated strong background in the development and supervision of fulltime and contract IT professionals.

Equal Opportunity Statement

The responsibilities described on this job description are intended to describe the general nature and level of work being performed by people assigned to this job. These statements are not intended to be exhaustive of all responsibilities, duties, knowledge, skills and abilities required of employees in the position. Final determination of a candidate's qualifications and eligibility to perform the job is at the sole discretion and judgment of the institute/department executive leadership.

This advertiser has chosen not to accept applicants from your region.

Information Security Officer

AED90000 - AED120000 Y confidential

Posted today

Job Viewed

Tap Again To Close

Job Description

Purpose and summary:

As the Information Security Officer, individual will be responsible for overseeing and implementing the information security program of the company within the regulatory framework of Abu Dhabi Global Market. ISO will play a crucial role in safeguarding company systems, networks, and data from potential threats and ensuring compliance with industry standards and best practices.

Key Responsibilities:

  • Information Security Strategy:
    Develop and implement an effective information security strategy aligned with the business objectives of the company and regulatory requirements of Abu Dhabi Global Market.

  • Risk Management:
    Conduct regular risk assessments and vulnerability scans to identify potential security threats and vulnerabilities. Develop and implement risk mitigation strategies to minimize security risks to the organization.

  • Security Policies and Procedures:
    Develop, review, and enforce information security policies, standards, and procedures to ensure compliance with regulatory requirements and industry best practices.

  • Security Awareness Training:
    Coordinate and conduct security awareness training programs for employees to promote a culture of security awareness and compliance throughout the organization.

  • Incident Response and Management:
    Establish an incident response plan and coordinate responses to security incidents, including conducting investigations, implementing remediation measures, and reporting incidents to relevant stakeholders.

  • Security Monitoring and Compliance:
    Implement security monitoring tools and techniques to detect and respond to security incidents in real-time. Ensure compliance with regulatory requirements, including reporting obligations to Abu Dhabi Global Market authorities.

  • Vendor Risk Management:
    Evaluate the security posture of third-party vendors and service providers. Develop and implement vendor risk management processes to ensure that vendors comply with information security requirements.

  • Security Audits and Assessments:
    Coordinate and participate in security audits and assessments conducted by internal and external auditors. Implement corrective actions to address findings and ensure continuous improvement of the information security program.

Qualifications:

  • Bachelor's degree in information technology, Computer Science, or a related field. Advanced degree or professional certifications (e.g., CISSP, CISM, CISA) preferred.
  • Minimum of 10 years of experience in information security management, preferably in the financial services industry or fintech sector.
  • In-depth knowledge of information security principles, standards, and best practices, including ISO 27001, NIST Cybersecurity Framework, and PCI DSS.
  • Experience in developing and implementing information security policies, standards, and procedures.
  • Strong analytical and problem-solving skills, with the ability to assess complex security risks and develop effective mitigation strategies.
  • Excellent communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex technical concepts to non-technical stakeholders.
  • Experience in conducting security awareness training and promoting a culture of security awareness within the organization.
  • Familiarity with regulatory requirements applicable to the financial services industry, particularly in Abu Dhabi Global Market.
  • Proven track record of managing security incidents and coordinating incident response efforts.
  • Experience in conducting security audits, assessments, and compliance reviews.
  • Knowledge of security monitoring tools and techniques for detecting and responding to security incidents in real-time.

Work Environment

  • Required to work office hours.
  • Flexibility to work longer hours from time-to-time as and when the job requires.
  • Open to travel requirements if needed.
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cryptography Jobs