18 National Security jobs in the United Arab Emirates
Security Consultant (UAE National)
Posted today
Job Viewed
Job Description
Help AG is looking for an experienced Security Consultant (U.A.E National) who will be responsible for the proper and accurate handling of support requests for Help AG’s customers. The security consultant will receive requests by email/calls and handle those according to Help AG’s support workflow including.
Continuous communication with the customer on tickets, health check, projects, and other technical work.
Based on the business requirement, security consultant will be required to work as resident engineer at customer site.
Proper and accurate use of tools (ticket system, time tracking) and documentation of the tickets.
Follow-up on any escalations meeting SLA.
Attend technical training and achieve certification as part of career development.
Additionally, security consultant is expected to work on projects, POC and documentation.
The primary targets are customer-satisfaction, professionalism, accuracy, and an outstanding high quality in the work/duties.
Work on technical support tickets from customers.
Perform health check for the supported technologies.
Work on projects and pre-sales activity as and when required.
Keep ticket-system up to date to meet SLA requirement.
Interaction and communication with vendor support organizations and engineers.
More than 5 years of working experience in technical Information Security.
Experience of working in an enterprise environment handling technical support, projects.
Bachelor’s degree in information security or IT-related matter or equivalent experience.
Deep understanding of technical relations in a complex environment.
An advantage to have experience and the highest certifications of the vendors F5 Networks, Broadcom, Palo Alto firewall, Pulse Secure, OPSWAT, Infoblox, Ixia, and Fortinet technologies.
Excellent and accent-free communication skills in English (Arabic would be an advantage).
Proper and structured documentation and diagramming.
Excellent organizational skills in enterprise support.
Understanding of information security concepts and related technologies.
Strong background and experience in TCP/IP networking of large-scale organizations.
Flexible work approach, based on the job requirements.
Being able to identify new work areas and to set new goals for themselves.
Excellent communication and training skills.
Outstanding customer handling, friendly and goal-oriented.
Being able to understand complex business processes and activities.
Health insurance with one of the leading global providers for medical insurance.
Career progression and growth through challenging projects and work.
Employee engagement and wellness campaigns activities throughout the year.
Excellent learning and development opportunities.
Inclusive and diverse working environment.
Flexible/hybrid working environment.
Open door policy.
Help AG is the cybersecurity arm of e& enterprise (formerly Etisalat Digital) and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by e& (formerly Etisalat Group) in 2020, hence creating a cybersecurity and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region’s trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and maintaining its focus on all aspects of cybersecurity.
With best of breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the‑art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
#J-18808-LjbffrIAM Security Analyst (UAE National)
Posted today
Job Viewed
Job Description
Company: Al Rostamani Group of Companies LLC
Every employee at Al Rostamani Group plays a role in making a real difference to the business and our customers. We care for our employees by offering them meaningful and purposeful work and an opportunity to grow, learn, contribute and succeed. Today, the Al Rostamani Group has come a long way since its birth in 1957. Our group has grown steadfastly with the guiding principles of Commitment, Care & Vision, alongside a strong sense of active involvement in the community. We are a well-diversified group, with a key presence in industries such as General Trading, Automobiles and Heavy Equipment, Travel, Foreign Exchange, Financial Services, Property Management, Construction, Infrastructure Development and Information Technology Services. Our Group employs approximately 2000 people from 41 different nationalities, which contributes to our multicultural and multi-national environment.
The Identity & Access Management (IAM) Security Analyst is responsible for protecting the organisation’s digital assets by managing identities, access controls, and authentication systems. This role ensures that only authorised users can access sensitive data, enforce the principle of least privilege, and support compliance with security policies and regulations. Working closely with IT Security & Governance, Group Information Technology, and other departments, the Analyst helps implement security measures, monitor for threats, and respond to incidents.
Beyond daily operations, the Analyst develops security protocols, works closely with business units to conduct access reviews and security assessments, and recommends improvements to strengthen the organisation’s cybersecurity posture. The role also involves cross‑functional collaboration, providing actionable insights to senior leadership, and promoting a culture of security awareness across the enterprise.
Technical Responsibilities
- Access Management and Review: Lead and manage the IAM lifecycle, including provisioning, modification, deprovisioning, and access reviews across all systems and applications.
- Security Monitoring and Incident Response: Monitor IAM and SIEM logs and alerts to identify and respond to suspicious activity, unauthorised access, and security incidents.
- Technical Due Diligence: Evaluate new applications for IAM compatibility, focusing on authentication, access controls, scalability, and security compliance.
- Vulnerability Assessment and Penetration Testing: Conduct comprehensive VA/PT across IT infrastructure, including servers, web applications, APIs, and mobile applications.
- Security Configuration Management: Oversee and optimise IAM solutions across cloud platforms, ensuring seamless system integrations and secure access through technical controls such as firewalls, WAF, NAC, and PAM.
- Security Technology Research: Actively research, evaluate, and drive next‑generation security technologies and solutions to meet organisational requirements.
Business Responsibilities
- Audit Coordination and Remediation: Support the coordination of internal and external audits, track security audit findings, and report remediation efforts.
- Policy and Governance: Enforce and support the development of IAM policies, procedures, and best practices, and remediate violations in coordination with IT Operations and Application teams.
- Security Training and Awareness: Assist in developing and delivering security training programs and awareness campaigns for employees.
- Compliance Monitoring: Monitor adherence to IT and security governance frameworks and recommend improvements.
- Vendor Liaison: Liaise with vendors for POCs and demos of new IT security requirements.
Qualifications
- Bachelor's degree or higher in a relevant field.
- Security certifications such as Certified Ethical Hacker (CEH) or CompTIA Security+ are preferred.
Experience
- Proven experience (typically 3+ years) in information security.
Knowledge and Skills
- Strong knowledge of cloud security, cybersecurity frameworks, standards, and best practices.
- Strong understanding of IT governance frameworks, regulatory requirements, and industry standards.
- Excellent communication and interpersonal skills.
- Demonstrated ability to influence and collaborate with cross‑functional teams.
- In‑depth understanding of risk management, compliance, and governance principles.
Experience in managing data protection mechanisms, preferably on cloud platforms like Microsoft Purview.
- Knowledge of the Microsoft Defender Suite and the Identity and Access Management suite.
- Understanding security solutions such as NAC, PAM, EDR, DLP, SIEM, SOAR, and NDR.
- Knowledge of security configurations in cloud platforms, e.g., AWS, Azure, and Microsoft 365.
At Al Rostamani Group, we seek talented people who work hard to achieve great things. We consider not only your skills and experience, but also your passion for the role, your desire to learn and how well you align with our core values of care, commitment and vision. If this position represents an opportunity you wish to pursue, we invite you to apply.
#J-18808-LjbffrInformation Security - Specialist (Operations)
Posted today
Job Viewed
Job Description
Overview
The Information Security - Specialist will report directly to the Information Security Manager and will be responsible for implementing and managing security measures to protect the Bank's information assets. This role focuses on proactive threat detection, incident response, and vulnerability management across all technology domains, including endpoints and cloud environments. In collaboration with IS management, the Specialist will identify gaps in existing information security policies, standards, guidelines, and procedures, recommending updates to ensure alignment with regulatory requirements, industry best practices, and leading security standards.
JOB CONTEXT/ DIMENSIONS The IS Specialist will be responsible for overseeing security technologies like Cloud Security, DLP, Kubernetes, API security, SIEM and EDR, and ensuring compliance with standards and policies. Responsibilities include managing incident response, performing risk assessments, and optimizing security tools across cloud and network environments. The position requires collaboration with internal teams and external stakeholders to enhance security posture and mitigate threats.
Responsibilities- Assist in developing and implementing the information security strategy and roadmap across all security technology domains.
- Research and analyze security standards, systems, and authentication protocols, providing recommendations to IS management.
- Review architectural security designs, Data flow and offer recommendations for approval by IS management.
- Enforce security policies and control across cloud environments to ensure a secure infrastructure.
- Manage and optimize CSPM tools to continuously monitor and enforce security best practices within cloud environments like Azure.
- Lead cloud incident response efforts, investigating and addressing threats in real-time to mitigate potential security risk.
- Lead the ongoing management of DLP technologies to protect sensitive data from unauthorized access and leakage.
- Regularly review and update DLP policies to reflect changes in business needs, technologies, and regulatory requirements.
- Identify and assess security risks in APIs and Kubernetes by evaluating access control, misconfigurations, and vulnerabilities.
- Enforce security policies and controls for APIs and Kubernetes.
- Oversee the management, optimization, and tuning of the SIEM platform to ensure effective security incident monitoring.
- Conduct deep-dive investigations into security alerts and collaborate with teams to resolve incidents efficiently.
- Conduct regular security audits and reviews to ensure compliance with internal policies and industry standards.
- Manage the deployment and operational effectiveness of EDR solutions to monitor, detect, and respond to endpoint threats.
- Lead incident response for security breaches, including investigation, containment, eradication, and recovery.
- Provide post-incident analysis, identify lessons learned, and improve future response strategies.
- Monitor the bank’s networks for security breaches and investigate violations as they occur.
- Advise IS management on emerging security trends and best practices, assist in updating security policies and procedures, and support departments in investigating breaches and pursuing disciplinary or legal actions as needed.
- Contribute to team efforts by accomplishing related results as needed.
- Perform other duties as may be assigned by IS management.
• Work within framework of bank’s information security policies, standards, guidelines and procedures as applicable.
• Work accomplishments will be reviewed by the Information Security Manager.
Education and Qualifications- Bachelor’s degree in computer science, Network/ Cyber Security or related information technology field.
- Professional / Technical Qualifications / Diplomas: Platform specific (e.g., SIEM/ Networking/ Operating System) certifications.
- Security (e.g. SANS/ ISC2 / CEH/ CISSP) certifications
8 - 10 years’ experience in Information Security or related field.
Role Competencies• In-depth knowledge and understanding in information security and technology infrastructure, ensuring robust protection of systems and applications.
• Expertise in enforcing cloud security policies, IAM configurations, and data protection practices to ensure a secure infrastructure.
• Proficient in managing and optimizing CSPM tools to continuously monitor and enforce security best practices.
• Experienced in reviewing and enhancing security configurations and architectures to align with industry best practices and compliance requirements.
• Proficient in managing API and Kubernetes security policies, including implementing posture management, access controls, encryption, and continuous monitoring to ensure a secure environment.
• Skilled in conducting thorough vulnerability assessments and comprehensive risk analyses, prioritizing risks and implementing remediation strategies to secure systems.
• Proficiency in configuring and managing DLP tools, data classification, policy enforcement, risk assessment, compliance knowledge, and integrating with security systems to prevent unauthorized data loss.
• Skilled in configuring, optimizing, and managing Security Information and Event Management (SIEM), EDR, and DAM platforms for real-time threat detection and effective incident response.
• Committed to enhancing organizational security posture through ongoing monitoring, assessment, and optimization of security tools and processes.
• Demonstrates innovative thinking by exploring alternative approaches and developing conceptual frameworks to address complex security challenges.
• Possesses strong communication skills, capable of conveying complex security concepts to senior non-technical stakeholders in clear, jargon-free language.
• Adept at managing multiple concurrent projects, effectively prioritizing tasks to meet organizational demands and deadlines.
#J-18808-LjbffrCYBERSECURITY DATA SECURITY SPECIALIST
Posted today
Job Viewed
Job Description
Abhu Dhabi, United Arab Emirates | Posted on 04/22/2025
JOB SUMMARY:The Data Security Specialist is responsible for implementing and maintaining data security measures to protect sensitive information and ensure compliance with regulatory requirements. This role involves assessing data security risks, developing policies and procedures, implementing data security controls, and providing guidance on best practices for data protection. The ideal candidate will have a strong understanding of data security principles, technologies, and regulatory frameworks, with the ability to collaborate effectively with cross-functional teams to mitigate security threats and safeguard data assets.
MAIN ROLES AND RESPONSIBILITIES: Job Specific Responsibilities:- Data Security Policies and Compliance: Develop and implement data security policies, procedures, and standards that align with organizational goals and regulatory requirements. Ensure compliance with data protection regulations and stay updated on the latest trends and technologies in data security.
- Data Inventory: Collaborate with business units to identify sensitive data types, including PII, intellectual property, and confidential data. Develop and maintain a data inventory and establish data flows to track sensitive data, facilitating the creation of data protection policies.
- Data Loss Prevention: Deploy and manage DLP solutions to prevent unauthorized data exfiltration, leakage, or loss. Configure DLP policies to monitor and control data movement across endpoints, networks, and cloud environments.
- Data Classification Solution: Develop and maintain data classification policies and guidelines to categorize data based on sensitivity and criticality. Implement data classification tools to facilitate labeling data according to predefined criteria.
- Digital Rights Management (DRM): Implement and configure DRM solutions to protect digital assets and intellectual property from unauthorized access or distribution. Develop DRM policies and procedures to define rules for accessing, sharing, and managing digital content.
- Secure Data Transfer: Define requirements for restrictions on sensitive data transfer and create DLP policies to enforce these requirements.
- Encryption and Data Protection Measures: Manage encryption technologies to secure data transmission, storage, and disposal. Advocate for robust data protection measures, including regular backups and restoration testing.
- Security Assessments and Audits: Conduct regular data security assessments to identify vulnerabilities. Recommend and implement mitigation strategies.
- Incident Response and Management: Monitor for data breaches and coordinate with cybersecurity teams to investigate and resolve incidents. Oversee secure disposal of data assets.
- Collaboration and Integration: Work with IT and other departments to embed data security measures into business processes and technology development, including secure coding practices.
- Training and Awareness: Lead training programs on data security best practices to increase organizational awareness.
- Contribute to departmental strategy, policies, and procedures aligned with client needs.
- Manage activities of direct reports to ensure efficiency.
- Assist in budget preparation and risk management.
- Implement continuous improvement initiatives based on international best practices.
- Ensure timely and accurate reporting.
- Protection of organizational data from unauthorized access or loss.
- Compliance with data protection laws.
- Enhanced employee awareness of data security practices.
Internal: Accounting, Procurement, Treasury, Operations Technology, Internal Audit, and other departments.
External: Vendors and service providers.
MINIMUM EDUCATION AND EXPERIENCE:Education: Bachelor’s degree in Cybersecurity, Computer Engineering, Computer Science, IT, or related field. A Master’s degree is desirable.
Certifications: At least one cybersecurity certification such as CDPSE, CISA, CISSP, or CISM. Additional certifications in information assurance or data privacy are a plus.
Experience: Minimum 5 years of experience in data security or related fields, with expertise in data protection strategies, laws (GDPR, CCPA), cloud security, NIST, and ISO27001 frameworks. Experience in multinational companies and in the energy/utilities sector is preferred.
#J-18808-LjbffrNetwork Security Specialist (Netscout & Firewall)
Posted today
Job Viewed
Job Description
Location: Dubai, United Arab Emirates | Posted on: 08/18/2025
Position: Network Security Specialist
Experience Required: 3 to 7 years
Employment Type: Full-time
Key Responsibilities- Manage Netscout AED & AEM appliances, perform daily health checks, and operational monitoring.
- Fine-tune detection thresholds and filters to optimize DDoS detection and minimize false positives.
- Manage mitigation strategies for volumetric and application-layer DDoS attacks.
- Ensure timely software/firmware upgrades.
- Provide reports and analytics on system performance, threat detection, and incident reviews.
- Administer daily firewall operations, including policy reviews, rule optimization, and log analysis.
- Monitor and analyze security events; perform deep packet inspections to identify threats.
- Configure and maintain security policies, NAT, and VPNs.
- Collaborate with incident response teams to contain and resolve threats.
- Manage and monitor Intrusion Prevention Systems (IPS), ensuring signatures and configurations are up-to-date.
- Investigate alerts, fine-tune IPS rules, and reduce false positives while maintaining strong defenses.
- Provide advanced analysis during intrusion attempts or suspicious activities.
- Deliver 24x7 operational support for system and security monitoring with real-time alert triage.
- Generate operational and security reports with insights, trends, and recommendations.
- Serve as a trusted technical advisor for network security, traffic engineering, and threat visibility.
- Conduct training sessions, knowledge transfers, and technical briefings with stakeholders.
- Escalate complex technical issues to vendor TAC/support and drive resolution.
- Hands-on experience with Netscout AED (Arbor Edge Defense) and Arbor Cloud.
- Firewall administration: Palo Alto, Cisco, or Fortigate.
- IPS management and tuning.
- Strong knowledge of DDoS mitigation strategies and traffic engineering.
- Experience in log analysis, incident investigation, and troubleshooting complex network security issues.
- Excellent communication and reporting skills.
- Ability to handle escalations and coordinate with vendor support teams.
- Certifications such as PCNSE, CCNP Security, NSE (Fortinet), or Netscout Certified.
- Experience in a SOC/NOC environment with large-scale enterprise networks.
- Strong analytical skills for pattern recognition and security recommendations.
Binance Accelerator Program - Web3 Security Specialist
Posted today
Job Viewed
Job Description
Binance is the global blockchain company behind the world’s largest digital asset exchange by trading volume and users, serving a greater mission to accelerate cryptocurrency adoption and increase the freedom of money.
Are you looking to be part of the most influential company in the blockchain industry and contribute to the crypto-currency revolution that is changing the world?
About Binance Accelerator Program (BAP)
Binance Accelerator Program is a concise fixed-term program designed for Early Career Talent to have an immersive experience in the rapidly expanding Web3 space. You will be given the opportunity to experience life at Binance and understand what goes on behind the scenes of the worlds’ leading blockchain ecosystem. Alongside your job, there will also be a focus on networking and development, which will expand your professional network and build transferable skills to propel you forward in your career.
Learn about BAP Program HERE
Who may apply
Current university students and recent graduates
Responsibilities- Assist in researching and analyzing emerging blockchain technologies, including consensus mechanisms, on-chain transaction models, and differences across various blockchain architectures (e.g., EVM vs non-EVM).
- Contribute to analyzing real-world Web3 security incidents under guidance, and help brainstorm proof-of-concept solutions.
- Monitor blockchain security news and report emerging risks, vulnerabilities, or novel attack vectors.
- Participate in internal discussions, team reviews, and threat modeling activities.
- Help document findings, write basic research summaries, and contribute to internal knowledge bases.
- Strong interest in blockchain, smart contracts, cybersecurity, or DeFi — enthusiasm and curiosity are key .
- Solid foundation in computer science or related technical background (students in CS, EE, math, etc. welcome).
- Familiarity with at least one programming language (e.g., Python, JavaScript, Solidity, or Rust is a plus).
- Basic understanding of blockchain concepts such as transactions, wallets, or smart contracts (coursework, personal projects, or self-study accepted).
- Strong problem-solving skills and willingness to dive into technical details.
- Fluency in English is required to be able to coordinate with overseas partners and stakeholders. Additional languages would be an advantage.
- Bonus: personal Web3 projects, CTF participation, GitHub contributions, blog posts, or any self-initiated security research.
IT Security Consultant Abu Dhabi Government
Posted today
Job Viewed
Job Description
Overview
Abu Dhabi is a leading hub for innovation and digital transformation in the UAE. Government departments are increasingly investing in cybersecurity to protect critical infrastructure, citizen data, and digital services. This has created a rising demand for skilled professionals in information security. One of the most sought-after positions is IT security consultant roles in Abu Dhabi government, where consultants play a vital role in safeguarding systems, managing risks, and implementing robust security protocols. If you have expertise in IT security, risk assessment, and compliance, this is a prime opportunity to advance your career within a prestigious government environment while contributing to national cybersecurity initiatives.
Easy Job Titles in IT Security Government Sector- IT Security Consultant – Government Projects
- Cybersecurity Analyst – Public Sector
- Information Security Officer – Abu Dhabi
- IT Risk & Compliance Consultant – Government
- Network Security Consultant – Public Authority
- Security Operations Specialist – Government IT
- Cloud Security Consultant – Abu Dhabi Agencies
- Education: Bachelor’s or Master’s degree in Information Technology, Cybersecurity, Computer Science, or a related field.
- Experience: 3–7 years in IT security, preferably with experience in government or critical infrastructure projects.
- Certifications: CISSP, CISM, CEH, ISO 27001 Lead Implementer, or other recognized cybersecurity certifications.
- Technical Skills: Proficiency in network security, firewalls, intrusion detection systems, vulnerability management, and endpoint security.
- Compliance Knowledge: Familiarity with UAE cybersecurity regulations, data protection laws, and government IT standards.
- Analytical Skills: Ability to assess risks, conduct security audits, and provide actionable recommendations.
- Soft Skills: Strong communication, problem-solving, and project management abilities.
IT security consultants working in Abu Dhabi government enjoy competitive salaries, comprehensive benefits, and opportunities for professional growth. Typical compensation packages include:
- Salary Range: AED 20,000 – AED 40,000 per month.
- Housing Allowance: Provided by some government agencies or included in the salary package.
- Transportation: Company car or travel allowance.
- Medical Insurance: Full coverage for employee and dependents.
- Annual Bonus: Performance-based incentives.
- Professional Development: Sponsored training, certifications, and workshops.
- Work-Life Balance: Paid leave, flexible schedules, and government holidays.
Leading government departments and authorities in Abu Dhabi such as the Abu Dhabi Digital Authority (ADDA), Department of Health, and other public entities regularly hire IT security consultants to strengthen their cybersecurity infrastructure. Candidates can apply directly through official government career portals or via UAE job platforms. Before applying, make sure your CV highlights relevant certifications, cybersecurity experience, and familiarity with UAE government IT standards.
ConclusionPursuing a career as an IT security consultant in Abu Dhabi government is an excellent opportunity for professionals looking to make a significant impact in national cybersecurity. With competitive salaries, comprehensive benefits, and exposure to advanced IT security projects, this role offers both professional growth and financial rewards. If you have the right qualifications, expertise, and passion for cybersecurity, now is the perfect time to apply and contribute to Abu Dhabi’s digital security initiatives.
FAQ – IT Security Consultant Abu Dhabi Q1: What is the average salary for IT security consultants in Abu Dhabi government?
A: Salaries typically range from AED 20,000 – AED 40,000 per month, depending on experience.
Q2: Do government agencies provide visa sponsorship for international candidates?
A: Yes, most Abu Dhabi government departments offer full visa sponsorship and relocation support.
Q3: Which certifications are most valued for IT security roles?
A: CISSP, CISM, CEH, and ISO 27001 are highly recognized and preferred.
Q4: Can international professionals apply for IT security consultant roles?
A: Absolutely, Abu Dhabi government welcomes skilled cybersecurity experts globally.
Q5: What skills are most important for IT security consultants?
A: Network security, risk assessment, vulnerability management, and compliance with UAE regulations are key.
Be The First To Know
About the latest National security Jobs in United Arab Emirates !
IT Infrastructure & Security Specialist | UAE Euro Gulf Techno Services
Posted today
Job Viewed
Job Description
Overview
IT Infrastructure & Security Specialist | UAE
Firm Name – Euro Gulf Tech Help
Responsibilities- Job Role – IT Set-Up & Safety Pro: Net & Safety Set-Up. Make & set up a strong net set-up for main & local sites. Run FortiGate firewalls, create strong security rules, NAT setups, and URL blocks. Set up & maintain VPNs. Manage core network tools such as routers, switches, and Wi‑Fi points. Improve Wi‑Fi capacity for higher usage and enforce BYOD rules. Monitor network usage and performance to keep systems reliable.
- Tool & Server Care: Manage a mixed Windows domain with Active Directory, DNS, and DHCP for 100+ users. Operate high-availability 2-node NEC setups with Fibre Channel SAN for key SQL/ERP jobs, aiming for 99.98% uptime via auto-patching. Create & enforce security policies and user rights via Group Policy. Maintain 99.9% uptime for servers and workstations through monitoring and maintenance.
- Cloud, Work & Save Care: Set up & administer Microsoft 365 with Exchange Online and Azure AD Connect. Manage mail retention and rules with MailStore Server, pulling data from multiple sources. Implement & maintain Veeam Backup & Replication with a 99.98% VM backup hit rate and deduplicate to reduce storage usage.
- Ops, Safety & Help: Maintain endpoint security for 100+ agents with eScan antivirus, conduct vulnerability scans, apply patches, and manage tool rules. Provide full end-user support and plan upkeep independently. Collaborate with IT vendors for procurement, support, and cost-effective choices. Manage shared devices like PABX, biometrics, and CCTV.
Senior Security Sales Specialist
Posted 8 days ago
Job Viewed
Job Description
**Do you love collaborating across teams to deliver customer success?**
**Join our Enterprise Security Team!**
Our Enterprise Division is responsible for selling Enterprise Security, Application Access products and Host based Network segmentation. Our goal is to navigate an evolution within customers to a more secure, dynamic and agile infrastructure. This relates to our Zero Trust architectures. Collaborating with our enterprise sales, internal teams and our external Channel Partners is key for our Go-to-Market.
**About the Team**
Our Enterprise Security team focuses on the development and selling of our Host based Network segmentation solution. Host based Network segmentation is key to protect customers against Ransomware threats in a changing hybrid I.T. environment. Our goal is to secure Enterprise environments with our agile solution.
As a Security Sales Specialist, you will be responsible for:
+ Driving the Enterprise Security agenda internally and externally.
+ Being a leader in driving the Enterprise Security agenda internally and externally
**Do what you love**
To be successful in this role you will:
+ Have experience leading high performance sales teams within a matrixed organization.
+ Have direct sales experience and be able to demonstrate C level access and engagement.
+ Able to work with our Channel Partners and continue successful collaboration.
+ Demonstrate excellent communication and presentation skills.
+ Have knowledge in: Micro-Segmentation (ex. Cisco Tetration, VMware NSX), Firewall, Data Center Technology, Zero Trust / SASE Technology area.
+ Be fluent in both Arabic and English.
**Work in a way that works for you**
FlexBase, Akamai's Global Flexible Working Program, is based on the principles that are helping us create the best workplace in the world. When our colleagues said that flexible working was important to them, we listened. We also know flexible working is important to many of the incredible people considering joining Akamai. FlexBase, gives 95% of employees the choice to work from their home, their office, or both (in the country advertised). This permanent workplace flexibility program is consistent and fair globally, to help us find incredible talent, virtually anywhere. We are happy to discuss working options for this role and encourage you to speak with your recruiter in more detail when you apply.
Learn ( what makes Akamai a great place to work
Connect with us on social and see what life at Akamai is like! ( ( ( power and protect life online, by solving the toughest challenges, together.**
At Akamai, we're curious, innovative, collaborative and tenacious. We celebrate diversity of thought and we hold an unwavering belief that we can make a meaningful difference. Our teams use their global perspectives to put customers at the forefront of everything they do, so if you are people-centric, you'll thrive here.
**Working for you**
At Akamai, we will provide you with opportunities to grow, flourish, and achieve great things. Our benefit options are designed to meet your individual needs for today and in the future. We provide benefits surrounding all aspects of your life:
+ Your health
+ Your finances
+ Your family
+ Your time at work
+ Your time pursuing other endeavors
Our benefit plan options are designed to meet your individual needs and budget, both today and in the future.
**About us**
Akamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences helping billions of people live, work, and play every day. With the world's most distributed compute platform from cloud to edge we make it easy for customers to develop and run applications, while we keep experiences closer to users and threats farther away.
**Join us**
Are you seeking an opportunity to learn and make a real impact in a global technology company? Come join us and learn with a team of people who will challenge and inspire you! By the end of your assignment, you will gain a network of encouraging colleagues ready to support you in your studies and beyond.
#LI-Remote
Senior Security Sales Specialist
Posted today
Job Viewed
Job Description
Overview
Would you like to work in a dynamic sales-growth role?
Do you love collaborating across teams to deliver customer success?
Join our Enterprise Security Team!
Our Enterprise Division is responsible for selling Enterprise Security, Application Access products and Host based Network segmentation. Our goal is to navigate an evolution within customers to a more secure, dynamic and agile infrastructure. This relates to our Zero Trust architectures. Collaborating with our enterprise sales, internal teams and our external Channel Partners is key for our Go-to-Market.
About the TeamOur Enterprise Security team focuses on the development and selling of our Host based Network segmentation solution. Host based Network segmentation is key to protect customers against Ransomware threats in a changing hybrid I.T. environment. Our goal is to secure Enterprise environments with our agile solution.
Responsibilities- As a Security Sales Specialist, you will be responsible for: Driving the Enterprise Security agenda internally and externally.
- Being a leader in driving the Enterprise Security agenda internally and externally.
To be successful in this role you will:
- Have experience leading high performance sales teams within a matrixed organization.
- Have direct sales experience and be able to demonstrate C level access and engagement.
- Able to work with our Channel Partners and continue successful collaboration.
- Demonstrate excellent communication and presentation skills.
- Have knowledge in: Micro-Segmentation (ex. Cisco Tetration, VMware NSX), Firewall, Data Center Technology, Zero Trust / SASE Technology area.
- Be fluent in both Arabic and English.
FlexBase, Akamai's Global Flexible Working Program, is based on the principles that are helping us create the best workplace in the world. When our colleagues said that flexible working was important to them, we listened. We also know flexible working is important to many of the incredible people considering joining Akamai. FlexBase, gives 95% of employees the choice to work from their home, their office, or both (in the country advertised). This permanent workplace flexibility program is consistent and fair globally, to help us find incredible talent, virtually anywhere. We are happy to discuss working options for this role and encourage you to speak with your recruiter in more detail when you apply.
Learn what makes Akamai a great place to work
We power and protect life onlineWe power and protect life online, by solving the toughest challenges, together.
At Akamai, we're curious, innovative, collaborative and tenacious. We celebrate diversity of thought and we hold an unwavering belief that we can make a meaningful difference. Our teams use their global perspectives to put customers at the forefront of everything they do, so if you are people-centric, you'll thrive here.
Working for youAt Akamai, we will provide you with opportunities to grow, flourish, and achieve great things. Our benefit options are designed to meet your individual needs for today and in the future. We provide benefits surrounding all aspects of your life:
- Your health
- Your finances
- Your family
- Your time at work
- Your time pursuing other endeavors
Our benefit plan options are designed to meet your individual needs and budget, both today and in the future.
About usAkamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences helping billions of people live, work, and play every day. With the world's most distributed compute platform from cloud to edge we make it easy for customers to develop and run applications, while we keep experiences closer to users and threats farther away.
Join usAre you seeking an opportunity to learn and make a real impact in a global technology company? Come join us and learn with a team of people who will challenge and inspire you! By the end of your assignment, you will gain a network of encouraging colleagues ready to support you in your studies and beyond.
#LI-Remote
#J-18808-Ljbffr