127 Cyber Threats jobs in the United Arab Emirates

Defend Cyber Threats

beBeeCybersecurity

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Technical Sales Engineer

About Our Technology

We deliver the world's best threat detection and analysis platform empowering organizations to augment and automate security operations.

Your Key Responsibilities

  • Evaluate customer requirements throughout the sales process
  • Provide product demonstrations highlighting technical value proposition of our products
  • Guide and support customers throughout evaluation phase
  • Provide technical training to partners, customers and prospects
  • Communicate customer feedback to our Products Team

Your Skills and Qualifications

  • University degree in IT or relevant field of study, or vocational training as IT specialist
  • 3-5 years experience in technical pre-sales roles
  • Strong technical background preferably in cybersecurity
  • Troubleshooting and Linux operating system experience
  • Knowledge of networking infrastructure and protocols
  • Presentation and communication skills with technical and sales functions
  • Willingness to work across time zones
  • Scripting and programming knowledge beneficial
  • Excellent English writing and speaking skills
  • Self-driven and motivated

What We Offer

  • Competitive salary
  • Career opportunities, advancement and development
  • Achievement recognition and awards
  • Part of a hyper-growth team
  • Flexible remote working
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

AED50000 - AED60000 Y Raqmiyat

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Information

Date Opened

08/19/2025

Job Type

Full time

Job Opening Status

In-progress

Work Experience

5+ years

Industry

Technology

Salary

12500

City

Abu Dhabi

State/Province

Abu Dhabi

Country

United Arab Emirates

Zip/Postal Code

51133

About Us

Raqmiyat is a UAE-based IT and digital transformation company specializing in consulting, staffing, and enterprise technology solutions. We empower banking, government, and enterprise clients across the Middle East to achieve their digital objectives.

Job Description

Key Responsibilities:

Penetration Testing and Red Teaming:

  • Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
  • Develop and execute custom tools and scripts to automate testing and exploitation processes.
  • Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
  • Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
  • ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
  • ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.

Threat Modeling and Risk Assessment:

  • Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
  • Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
  • Provide recommendations for remediation and mitigation strategies

    Incident Response and Crisis Management:
  • Participate in security incident response and crisis management efforts as needed
  • Collaborate with incident response teams to contain and remediate security incidents
  • Provide technical expertise and guidance during incident response efforts
  • Security Research and Development:
  • Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
  • Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
  • Participate in security research and development efforts to identify and develop new testing techniques and methodologies
Benefits
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

AED90000 - AED120000 Y Raqmiyat L.L.C

Posted today

Job Viewed

Tap Again To Close

Job Description

Key Responsibilities:

Penetration Testing and Red Teaming:

  • Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
  • Develop and execute custom tools and scripts to automate testing and exploitation processes.
  • Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
  • Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
  • ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
  • ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.

Threat Modeling and Risk Assessment:

  • Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
  • Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
  • Provide recommendations for remediation and mitigation strategiesIncident Response and Crisis Management:
  • Participate in security incident response and crisis management efforts as needed
  • Collaborate with incident response teams to contain and remediate security incidents
  • Provide technical expertise and guidance during incident response efforts
  • Security Research and Development:
  • Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
  • Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
  • Participate in security research and development efforts to identify and develop new testing techniques and methodologies
Benefits
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

AED120000 - AED250000 Y TAT IT Technolgies

Posted today

Job Viewed

Tap Again To Close

Job Description

We have an urgent requirement for Information Security Analyst for our client based at Abu Dhabi
Key Responsibilities
Penetration Testing and Red Teaming:

  • Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
  • Develop and execute custom tools and scripts to automate testing and exploitation processes.
  • Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
  • Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
  • ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
  • ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.

Vulnerability Assessment

  • Perform thorough vulnerability assessments to identify and prioritize security weaknesses.
  • Utilize industry-standard tools such as Qualys, Nessus or Nexpose and methodologies to uncover vulnerabilities in various environments.
  • Provide actionable recommendations for remediation and mitigation strategies.
  • Patch management

Threat Modeling And Risk Assessment

  • Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
  • Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
  • Provide recommendations for remediation and mitigation strategies

Incident Response And Crisis Management

  • Participate in security incident response and crisis management efforts as needed
  • Collaborate with incident response teams to contain and remediate security incidents
  • Provide technical expertise and guidance during incident response efforts

Security Research And Development

  • Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
  • Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
  • Participate in security research and development efforts to identify and develop new testing techniques and methodologies

Collaboration And Communication

  • Collaborate with development teams to implement security patches and fixes
  • Provide technical guidance and support to development teams on security-related issues
  • Communicate complex technical information to non-technical stakeholders in a clear and concise manner

Reporting And Documentation

  • Develop and maintain detailed reports on findings, including vulnerability assessments, penetration testing results, and recommendations for remediation
  • Document testing methodologies, tools, and results in a clear and concise manner
  • Maintain accurate and up-to-date records of testing activities and results

Mandatory Requirements

  • Bachelor's degree in Computer Science, Information Assurance, or a related field
  • OSCP, CEH, or other relevant certifications
  • 5+ years of experience in penetration testing, vulnerability assessment, or a related field
  • Strong understanding of networking protocols, operating systems, and applications
  • Proficiency in programming languages such as Python, C++, or Java
  • Experience with penetration testing frameworks and tools such as Nmap, Nessus, Burp Suite, or Metasploit
  • Strong analytical and problem-solving skills
  • Excellent communication and reporting skills
  • Ability to work independently and as part of a team
  • Strong attention to detail and ability to maintain accurate records
  • Ability to work in a fast-paced environment with tight deadlines

Preferred Additional Requirements

  • Experience with cloud-based technologies and cloud security
  • Familiarity with Agile development methodologies
  • Strong understanding of compliance and regulatory requirements (e.g., GDPR, PCI-DSS)
  • Experience with security orchestration, automation, and response (SOAR) tools
  • Familiarity with threat intelligence and threat hunting

Skills: security,information,penetration testing,vulnerability

This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Abu Dhabi, Abu Dhabi TAT IT Technolgies

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

We have an urgent requirement for Information Security Analyst for our client based at Abu Dhabi

Key Responsibilities
  • Penetration Testing and Red Teaming: Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
  • Develop and execute custom tools and scripts to automate testing and exploitation processes.
  • Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
  • Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
  • ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
  • ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.
Vulnerability Assessment
  • Perform thorough vulnerability assessments to identify and prioritize security weaknesses.
  • Utilize industry-standard tools such as Qualys, Nessus or Nexpose and methodologies to uncover vulnerabilities in various environments.
  • Provide actionable recommendations for remediation and mitigation strategies.
  • Patch management
Threat Modeling And Risk Assessment
  • Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities.
  • Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities.
  • Provide recommendations for remediation and mitigation strategies.
Incident Response And Crisis Management
  • Participate in security incident response and crisis management efforts as needed.
  • Collaborate with incident response teams to contain and remediate security incidents.
  • Provide technical expertise and guidance during incident response efforts.
Security Research And Development
  • Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly.
  • Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies.
  • Participate in security research and development efforts to identify and develop new testing techniques and methodologies.
Collaboration And Communication
  • Collaborate with development teams to implement security patches and fixes.
  • Provide technical guidance and support to development teams on security-related issues.
  • Communicate complex technical information to non-technical stakeholders in a clear and concise manner.
Reporting And Documentation
  • Develop and maintain detailed reports on findings, including vulnerability assessments, penetration testing results, and recommendations for remediation.
  • Document testing methodologies, tools, and results in a clear and concise manner.
  • Maintain accurate and up-to-date records of testing activities and results.
Mandatory Requirements
  • Bachelor's degree in Computer Science, Information Assurance, or a related field
  • OSCP, CEH, or other relevant certifications
  • 5+ years of experience in penetration testing, vulnerability assessment, or a related field
  • Strong understanding of networking protocols, operating systems, and applications
  • Proficiency in programming languages such as Python, C++, or Java
  • Experience with penetration testing frameworks and tools such as Nmap, Nessus, Burp Suite, or Metasploit
  • Strong analytical and problem-solving skills
  • Excellent communication and reporting skills
  • Ability to work independently and as part of a team
  • Strong attention to detail and ability to maintain accurate records
  • Ability to work in a fast-paced environment with tight deadlines
Preferred Additional Requirements
  • Experience with cloud-based technologies and cloud security
  • Familiarity with Agile development methodologies
  • Strong understanding of compliance and regulatory requirements (e.g., GDPR, PCI-DSS)
  • Experience with security orchestration, automation, and response (SOAR) tools
  • Familiarity with threat intelligence and threat hunting
Seniority level
  • Associate
Employment type
  • Full-time
Job function
  • Information Technology
Industries
  • Technology, Information and Internet
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Abu Dhabi, Abu Dhabi TAT IT Technolgies

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

We have an urgent requirement for Information Security Analyst for our client based at Abu Dhabi

Key Responsibilities

Penetration Testing and Red Teaming:
  • Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
  • Develop and execute custom tools and scripts to automate testing and exploitation processes.
  • Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
  • Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
  • ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
  • ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.

Vulnerability Assessment
  • Perform thorough vulnerability assessments to identify and prioritize security weaknesses.
  • Utilize industry-standard tools such as Qualys, Nessus or Nexpose and methodologies to uncover vulnerabilities in various environments.
  • Provide actionable recommendations for remediation and mitigation strategies.
  • Patch management

Threat Modeling And Risk Assessment
  • Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
  • Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
  • Provide recommendations for remediation and mitigation strategies

Incident Response And Crisis Management
  • Participate in security incident response and crisis management efforts as needed
  • Collaborate with incident response teams to contain and remediate security incidents
  • Provide technical expertise and guidance during incident response efforts

Security Research And Development
  • Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
  • Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
  • Participate in security research and development efforts to identify and develop new testing techniques and methodologies

Collaboration And Communication
  • Collaborate with development teams to implement security patches and fixes
  • Provide technical guidance and support to development teams on security-related issues
  • Communicate complex technical information to non-technical stakeholders in a clear and concise manner

Reporting And Documentation
  • Develop and maintain detailed reports on findings, including vulnerability assessments, penetration testing results, and recommendations for remediation
  • Document testing methodologies, tools, and results in a clear and concise manner
  • Maintain accurate and up-to-date records of testing activities and results

Mandatory Requirements
  • Bachelor's degree in Computer Science, Information Assurance, or a related field
  • OSCP, CEH, or other relevant certifications
  • 5+ years of experience in penetration testing, vulnerability assessment, or a related field
  • Strong understanding of networking protocols, operating systems, and applications
  • Proficiency in programming languages such as Python, C++, or Java
  • Experience with penetration testing frameworks and tools such as Nmap, Nessus, Burp Suite, or Metasploit
  • Strong analytical and problem-solving skills
  • Excellent communication and reporting skills
  • Ability to work independently and as part of a team
  • Strong attention to detail and ability to maintain accurate records
  • Ability to work in a fast-paced environment with tight deadlines

Preferred Additional Requirements
  • Experience with cloud-based technologies and cloud security
  • Familiarity with Agile development methodologies
  • Strong understanding of compliance and regulatory requirements (e.g., GDPR, PCI-DSS)
  • Experience with security orchestration, automation, and response (SOAR) tools
  • Familiarity with threat intelligence and threat hunting

Skills: security,information,penetration testing,vulnerability
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security

Sharjah, Sharjah Dicetek LLC

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Minimum Qualifications
  • An Engineering Degree, with 5+ Years experience in local / international Data Protection in BFSI.
  • Hands on experience in implementing data protection regulations.
  • Expertise in data protection laws and regulations (like CBUAE Consumer Data Protection, UAE Privacy Laws and applicable global data protection requirements).
  • Certification related to CIPP/E, CIPM, CIPT, CDPO, etc are preferred.
  • Strong knowledge of information Security, Data Protection and IT Systems.
Job Responsibilities
  • Assist in implementing Bank's policies and procedures in accordance with data protection laws and regulations (like CBUAE Consumer Data Protection, UAE Privacy Laws and applicable global data protection requirements) and advising the business on data protection and privacy matters.
  • Leading as required and maintaining cross-functional working groups to coordinate data protection efforts, including current projects and initiatives and regulatory awareness across the Bank.
  • Executing data protection and privacy monitoring and compliance testing reviews.
  • Evaluate the existing data protection framework and identify areas of non or partial compliance and rectify any issues.
  • Maintain an inventory of all personal data stored and data processing activities, including how and why the company collects, shares and uses personal data.
  • Work with the Contracts, Vendor Management and Compliance/Business departments to ensure that third-party suppliers contracts and operating-level agreements meet privacy requirements.
  • To support and promote a culture of awareness of data security / data protection throughout the bank.
  • Hold training with staff members across different business units who are involved in data handling or processing.
  • Work with and manage external vendors / auditors during assessments.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cyber threats Jobs in United Arab Emirates !

Specialist Information Security

AED120000 - AED240000 Y Tabreed

Posted today

Job Viewed

Tap Again To Close

Job Description

Position Title:
Specialist Information Security
JOB OBJECTIVE:
This role requires a technical expert with broad experience architecting and implementing information security technology solutions in a large enterprise environment. They must be able to act as a technical leader to support talent development and the building of high-performance teams. An effective collaborator, the Cybersecurity Specialist will work closely with key stakeholders including the Sr. Network Engineer, Systems Architect, and other teams to implement effective business solutions. With deep and broad background in information security and related services, the successful candidate will also be current with emerging best practices and service trends, particularly all aspects of cloud computing.

  • Security systems development, testing, analysis, and implementation
  • System vulnerability assessment and management
  • Response to security threats, attacks, and similar events
  • Development of threat prevention strategies
  • Coordinate & conduct black/white box security assessments with industry standard security tools
  • Regular generation of reports for executives and administrators
  • Comply with Health, Safety and Environment Policies (mandatory for all)
  • Risk Management (mandatory; line manager discretion)
  • Work independently on technical issues and recommend design solutions.
  • Demonstrate a solid understanding of infrastructure, virtualization, cybersecurity standards, and operating procedures.
  • Collaborate with other members of the cybersecurity team to develop new protocols, layers of protection, and other both proactive and defensive systems that stay one step ahead of cyber criminals.
  • Maintain security guidelines, procedures, standards, and controls documentation
  • Maintain a working knowledge of current cybercrime tactics.
  • Lead the analysis of the current technology environment to detect critical deficiencies and recommend solutions for improvement Conduct incident response analyses; develop.
  • Participate in and lead design sessions with Finning personnel as well as external parties.
  • Consult on application or infrastructure development projects to harmonize systems or infrastructure.
  • Assist with designing the governance activities associated with ensuring compliance with Information Security Policies.
  • Monitor and ensuring compliance to standards, policies, and procedures.
  • Define high-level migration plans to address the gaps between the current and future state, typically in sync with the budgeting or other planning processes.

KEY ACCOUNTABILITIES:
Description

  • Develop, support, and advance strategies, policies, programs, and projects designed to continually improve and enhance cyber and information security posture and resiliency
  • Oversee compliance with applicable laws, rules, and regulations related to cyber and information security
  • Work with the compliance team to establish policies/standards/guidelines to ensure systems record user activities and access to sensitive data in support of insider risk management
  • Develop and implement software security compliance program that takes a risk-based approach to ensure appropriate compliance to policies/standards/guidelines
  • Contribute to awareness and outreach efforts both internally and externally
  • Attend all regular, special, and emergency meetings regarding cyber and information security
  • Regularly review the operation of security controls and recommend changes designed to improve effectiveness and/or counter emerging risks
  • Make appropriate recommendations for security enhancements to the line manager or any external vendor providing services including tools, technologies, services, policies, procedures, and other areas as needed
  • Lead efforts to evaluate and select vendors for security assessments, penetration testing, and other similar security services
  • Direct and oversee the evaluation of security tools and make acquisition recommendations to the IT Security Manager
  • Manage budgets, maintain financial forecasts, develop, and present business cases
  • Establish objectives and milestones and manage activities to deliver high-quality results within budget and schedule
  • Other duties and obligations as assigned by the line manager
  • Work with multiple stakeholders to identify areas for cyber risk reduction on the IT Infrastructure and OT systems.
  • Lead the evaluation of the potential impact of implementing difference cyber risk reduction methods (i.e., cyber security controls) with in the IT infrastructure.
  • Act as the primary interface with the Tabreed stakeholders to architect the defensive model and implement cyber security controls across Tabreed IT & OT systems for desired risk reduction.

Assess Current State and Areas for Risk Reduction:

  • Lead the conduct of a cyber-security self-assessment initiatives based on international standard, national standards, and state of practice.
  • Assess the Tabreed's defensive strategy and the implementation of the cyber security program.
  • Provide an evaluation on current milestone delivery and regulatory compliance.
  • Lead the development of a corrective action plan for achieving desired risk reduction and maturing program elements.

Risk Reduction Strategy Development:

  • Lead the development of a risk reduction strategy for the protection of Tabreed critical systems and associated critical digital assets (CDAs).
  • Lead the development of a risk management strategy to include a cyber security control implementation strategy for effective and sustainable risk reduction.
  • Assist in establishing key performance indicators to monitor changes in cyber risk.
  • Communicates with senior leadership on cyber security strategic issues and current risks.
  • Act as a liaison with the UAE regulatory authority, to validate cyber security performance meets or exceeds regulatory expectations for protection against the design basis threat.

Leading Solutions Design:

  • Leads the creation of deliverables related to design and analysis of technology solution to ensure that solution meet business and operation needs.
  • Design, Build, Implement and support an Enterprise-class security systems.
  • Design security architecture elements to mitigate threats as they emerge.
  • Create solutions that balance business requirements with information and cybersecurity requirements

Risk Management:

  • Analyse current risks and identify potential risks in responsibility
  • Report the risk tailored to the relevant audience
  • Build risk awareness amongst team by providing support and training

Framework:

  • Follow the international framework designed to standardize the selection, planning, delivery, and maintenance of IT services within a business

Technology Research:

  • Strategic planning (medium and long term) based on company objectives to keep in line with new developments in IT
  • Research new technology to determine what would best support their organization in the future

JOB REQUIREMENTS:
Minimum Qualifications:

  • Bachelor's degree holder in Computer Science/Engineering or equivalent Knowledge
  • Broad knowledge across all areas of the Technology Architecture domain including Cloud Computing (IaaS, PaaS, AWS, Azure etc.) Data Center, Data Storage Technologies, Virtualization, server platforms (Windows and Linux), Desktop, mobility solutions, systems monitoring/management, data protection, high availability/clustering, network (WAN/LAN/WLAN etc.), Security (Firewall, IDS/IPS, VPN etc.)
  • Strong proficiency in Incident Management and Response.
  • Experience in security device management and SIEM.
  • In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
  • Experience in threat management and threat intelligence.
  • Good understanding of Infrastructure Security and its impact on Security Operations, Vulnerabilities, Reporting, Analytics and Monitoring.
  • Ability to develop a comprehensive understanding of Finning's business, market and industry and relate that knowledge to identified operations and IT-related risks
  • Familiar with the basic principles of organizational change management, and understanding of how to apply these principles
  • Ability to understand the long-term ("big picture") and short-term perspectives of situations
  • Ability to estimate the financial impact of risk mitigation alternatives
  • Ability to quickly comprehend the functions and capabilities of new technologies
  • Knowledge of many, if not most, aspects of information security architecture Understanding of network and enterprise architecture Certifications: CISSP or CISM , Network and security , Microsoft Azure Administrator Certification and Industrial Cybersecurity

Minimum Experience:

  • Minimum 5 years' experience in Information Technology (IT) & Operational Technology (OT) Cyber security
  • Hands-on experience running mission-critical cybersecurity operations
  • Proven experience building a service-oriented organization and driving or promoting a service delivery model
  • Exhibit excellent analytical skills and the ability to manage multiple projects under strict timelines as well as the ability to work well in a demanding, dynamic environment and meet overall objectives
  • Project management skills: financial/budget management, scheduling, and resource management
  • Experience with contract and vendor negotiations, and expertise in negotiating complex contracts and managing vendors, including design, and tracking of Service Level Agreements (SLAs)
  • High level of personal integrity as well as the ability to professionally handle confidential matters and to show an appropriate level of judgment and maturity
  • Self-starter, accountability, and the ability to work with little supervision
  • Limited travel to project sites
  • Due to nature of 24/7 operation may be required to work after hours or on weekend
  • Flexibility to work in shifts as required
This advertiser has chosen not to accept applicants from your region.

Information Security Officer

AED30000 - AED60000 Y BOST Trading

Posted today

Job Viewed

Tap Again To Close

Job Description

Full job description

The Information Security Officer is responsible for developing and maintaining the hospital's information security framework. The role involves overseeing security operations, ensuring compliance with Abu Dhabi Healthcare Information and Cyber Security Standard (ADHICS), and contributing to key projects such as SOC (Security Operations Center) implementation, SIEM, and Data Loss Prevention (DLP) systems.

Essential Job Functions and Key Accountabilities:

  • Develop, implement, and monitor a strategic, comprehensive enterprise information security and IT risk management program.
  • Execute periodic and ad-hoc compliance checks and cyber risk assessments in alignment with mandated cybersecurity policies and guidelines.
  • Recommend and implement remedial actions for non-compliance issues.
  • Contribute to Risk Management Framework documentation and activities (e.g., system life-cycle support plans, operational procedures, maintenance training materials).
  • Participate in risk governance processes to evaluate and address security risks.
  • Lead and Monitor the implementation of SOC and SIEM solutions.
  • Oversee DLP strategies and governance.
  • Perform regular audits, security scans, and risk assessments.
  • Define and enforce security protocols, policies, and procedures.
  • Ensure compliance with UAE regulations and international standards.
  • Conduct cybersecurity awareness training for staff.
  • Collaborate with IT and clinical departments to integrate security into all systems and workflows.
  • Investigate and respond to security incidents and breaches.

Competency Standards

Clinical/Technical Competencies:

  • Cyber security and privacy principles (confidentiality, integrity, availability).
  • Networking protocols and network security threats.
  • Laws, regulations, and ethics related to cyber security.
  • Information classification and compromise procedures.
  • Security scanning, vulnerability assessments and penetration testing.
  • PHI (Personal Health Information) data protection standards.
  • Security architecture, including topology, protocols, and components.
  • Experience with SIEM tools.
  • DLP platform experience
  • Familiarity with Firewalls, IDS/IPS, and Endpoint Protection.
  • Microsoft Azure and Office 365 security solutions.
  • ADHICS implementation experience preferred.

Qualification

Bachelor's Degree in Information Technology, Computer Science, or Cybersecurity.

Diploma holders with strong relevant experience may be considered.

Job Types: Full-time, Fresher

Pay: From AED2,500.00 per month

This advertiser has chosen not to accept applicants from your region.

Information Security Manager

AED90000 - AED120000 Y Cleveland Clinic Abu Dhabi

Posted today

Job Viewed

Tap Again To Close

Job Description

About the Company

Responsible for the technical strategic design, implementation, and operational management of the enterprise data security infrastructure in the support and enforcement of organization policies and priorities. This person will provide leadership to ensure sustainable, high quality delivery of technical security systems and related tools to safeguard the availability and integrity of all CCAD data.

About the Role

Reports directly to Executive Director, Technology & Development. Reports indirectly to N/A. Head Count Managed Approx. 2. Number of Direct Reports Approx. 0. Number of Indirect Reports Approx. 2. Financial Accountability N/A.

Responsibilities

  • Responsible for the technical strategic design, implementation, and management of enterprise security systems to include but not limited to firewalls, intrusion detection systems, application security integration, secure remote access, data encryption, identity management and access provisioning, user and system auditing and reporting, HIPPA, VPN, SSL, smart card/token access systems, wireless device security , VOIP security, workstation end point patch management, anti-spam, anti-virus, anti-malware/spyware systems and management tools, and new technology and regulatory requirements potentially impacting the security posture of CCAD.
  • Provide technical oversight of vended services covering these areas of responsibility and proactively plan for future growth and technological innovations that effect the hospital's environment related to these knowledge areas.
  • Work closely with CCAD customer groups to ensure that service levels are being met while utilizing resources efficiently and effectively.
  • Manages both full time staff and contract labor to adequately design, implement, and support technical solutions.
  • Provide guidance, coaching, and formal counseling to CCAD and contract staff to include but not limited to training, appraisals, corrective action, and employment/contract termination.
  • Ensure performance management standards are being met and services are being delivered according to set agreements and/or contracts.
  • Performs other duties as assigned.

Qualifications

  • Education: Bachelor's degree or technical degree in Information Technology or a related field is preferred.
  • Experience: Minimum of 6 (six) years of professional job experience working with large organizations in support of the technical design, implementation, and management of enterprise data security and associated technologies. Minimum of two (2) years of experience supporting technical environments in a large U.S. based Hospital supporting a user base of more than 5000 users. Demonstrated strong background in the development and supervision of fulltime and contract IT professionals.
  • Certification and Licensure: CISSP is required.
  • Professional Membership: N/A.

Required Skills

  • Proficiency with Microsoft Office suite.
  • Ability to speak and write in English is required.

Preferred Skills

  • Demonstrated strong background in the development and supervision of fulltime and contract IT professionals.

Equal Opportunity Statement

The responsibilities described on this job description are intended to describe the general nature and level of work being performed by people assigned to this job. These statements are not intended to be exhaustive of all responsibilities, duties, knowledge, skills and abilities required of employees in the position. Final determination of a candidate's qualifications and eligibility to perform the job is at the sole discretion and judgment of the institute/department executive leadership.

This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cyber Threats Jobs