2 074 Security Specialists jobs in the United Arab Emirates

Information Security Analyst

AED50000 - AED60000 Y Raqmiyat

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Information

Date Opened

08/19/2025

Job Type

Full time

Job Opening Status

In-progress

Work Experience

5+ years

Industry

Technology

Salary

12500

City

Abu Dhabi

State/Province

Abu Dhabi

Country

United Arab Emirates

Zip/Postal Code

51133

About Us

Raqmiyat is a UAE-based IT and digital transformation company specializing in consulting, staffing, and enterprise technology solutions. We empower banking, government, and enterprise clients across the Middle East to achieve their digital objectives.

Job Description

Key Responsibilities:

Penetration Testing and Red Teaming:

  • Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
  • Develop and execute custom tools and scripts to automate testing and exploitation processes.
  • Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
  • Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
  • ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
  • ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.

Threat Modeling and Risk Assessment:

  • Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
  • Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
  • Provide recommendations for remediation and mitigation strategies

    Incident Response and Crisis Management:
  • Participate in security incident response and crisis management efforts as needed
  • Collaborate with incident response teams to contain and remediate security incidents
  • Provide technical expertise and guidance during incident response efforts
  • Security Research and Development:
  • Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
  • Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
  • Participate in security research and development efforts to identify and develop new testing techniques and methodologies
Benefits
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

AED120000 - AED250000 Y TAT IT Technolgies

Posted today

Job Viewed

Tap Again To Close

Job Description

We have an urgent requirement for Information Security Analyst for our client based at Abu Dhabi
Key Responsibilities
Penetration Testing and Red Teaming:

  • Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
  • Develop and execute custom tools and scripts to automate testing and exploitation processes.
  • Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
  • Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
  • ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
  • ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.

Vulnerability Assessment

  • Perform thorough vulnerability assessments to identify and prioritize security weaknesses.
  • Utilize industry-standard tools such as Qualys, Nessus or Nexpose and methodologies to uncover vulnerabilities in various environments.
  • Provide actionable recommendations for remediation and mitigation strategies.
  • Patch management

Threat Modeling And Risk Assessment

  • Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
  • Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
  • Provide recommendations for remediation and mitigation strategies

Incident Response And Crisis Management

  • Participate in security incident response and crisis management efforts as needed
  • Collaborate with incident response teams to contain and remediate security incidents
  • Provide technical expertise and guidance during incident response efforts

Security Research And Development

  • Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
  • Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
  • Participate in security research and development efforts to identify and develop new testing techniques and methodologies

Collaboration And Communication

  • Collaborate with development teams to implement security patches and fixes
  • Provide technical guidance and support to development teams on security-related issues
  • Communicate complex technical information to non-technical stakeholders in a clear and concise manner

Reporting And Documentation

  • Develop and maintain detailed reports on findings, including vulnerability assessments, penetration testing results, and recommendations for remediation
  • Document testing methodologies, tools, and results in a clear and concise manner
  • Maintain accurate and up-to-date records of testing activities and results

Mandatory Requirements

  • Bachelor's degree in Computer Science, Information Assurance, or a related field
  • OSCP, CEH, or other relevant certifications
  • 5+ years of experience in penetration testing, vulnerability assessment, or a related field
  • Strong understanding of networking protocols, operating systems, and applications
  • Proficiency in programming languages such as Python, C++, or Java
  • Experience with penetration testing frameworks and tools such as Nmap, Nessus, Burp Suite, or Metasploit
  • Strong analytical and problem-solving skills
  • Excellent communication and reporting skills
  • Ability to work independently and as part of a team
  • Strong attention to detail and ability to maintain accurate records
  • Ability to work in a fast-paced environment with tight deadlines

Preferred Additional Requirements

  • Experience with cloud-based technologies and cloud security
  • Familiarity with Agile development methodologies
  • Strong understanding of compliance and regulatory requirements (e.g., GDPR, PCI-DSS)
  • Experience with security orchestration, automation, and response (SOAR) tools
  • Familiarity with threat intelligence and threat hunting

Skills: security,information,penetration testing,vulnerability

This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

AED90000 - AED120000 Y Raqmiyat L.L.C

Posted today

Job Viewed

Tap Again To Close

Job Description

Key Responsibilities:

Penetration Testing and Red Teaming:

  • Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
  • Develop and execute custom tools and scripts to automate testing and exploitation processes.
  • Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
  • Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
  • ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
  • ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.

Threat Modeling and Risk Assessment:

  • Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
  • Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
  • Provide recommendations for remediation and mitigation strategiesIncident Response and Crisis Management:
  • Participate in security incident response and crisis management efforts as needed
  • Collaborate with incident response teams to contain and remediate security incidents
  • Provide technical expertise and guidance during incident response efforts
  • Security Research and Development:
  • Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
  • Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
  • Participate in security research and development efforts to identify and develop new testing techniques and methodologies
Benefits
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Abu Dhabi, Abu Dhabi TAT IT Technolgies

Posted today

Job Viewed

Tap Again To Close

Job Description

We have an urgent requirement for Information Security Analyst for our client based at Abu Dhabi

Key Responsibilities
  • Penetration Testing and Red Teaming: Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
  • Develop and execute custom tools and scripts to automate testing and exploitation processes.
  • Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
  • Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
  • ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
  • ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.
Vulnerability Assessment
  • Perform thorough vulnerability assessments to identify and prioritize security weaknesses.
  • Utilize industry-standard tools such as Qualys, Nessus or Nexpose and methodologies to uncover vulnerabilities in various environments.
  • Provide actionable recommendations for remediation and mitigation strategies.
  • Patch management
Threat Modeling And Risk Assessment
  • Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities.
  • Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities.
  • Provide recommendations for remediation and mitigation strategies.
Incident Response And Crisis Management
  • Participate in security incident response and crisis management efforts as needed.
  • Collaborate with incident response teams to contain and remediate security incidents.
  • Provide technical expertise and guidance during incident response efforts.
Security Research And Development
  • Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly.
  • Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies.
  • Participate in security research and development efforts to identify and develop new testing techniques and methodologies.
Collaboration And Communication
  • Collaborate with development teams to implement security patches and fixes.
  • Provide technical guidance and support to development teams on security-related issues.
  • Communicate complex technical information to non-technical stakeholders in a clear and concise manner.
Reporting And Documentation
  • Develop and maintain detailed reports on findings, including vulnerability assessments, penetration testing results, and recommendations for remediation.
  • Document testing methodologies, tools, and results in a clear and concise manner.
  • Maintain accurate and up-to-date records of testing activities and results.
Mandatory Requirements
  • Bachelor's degree in Computer Science, Information Assurance, or a related field
  • OSCP, CEH, or other relevant certifications
  • 5+ years of experience in penetration testing, vulnerability assessment, or a related field
  • Strong understanding of networking protocols, operating systems, and applications
  • Proficiency in programming languages such as Python, C++, or Java
  • Experience with penetration testing frameworks and tools such as Nmap, Nessus, Burp Suite, or Metasploit
  • Strong analytical and problem-solving skills
  • Excellent communication and reporting skills
  • Ability to work independently and as part of a team
  • Strong attention to detail and ability to maintain accurate records
  • Ability to work in a fast-paced environment with tight deadlines
Preferred Additional Requirements
  • Experience with cloud-based technologies and cloud security
  • Familiarity with Agile development methodologies
  • Strong understanding of compliance and regulatory requirements (e.g., GDPR, PCI-DSS)
  • Experience with security orchestration, automation, and response (SOAR) tools
  • Familiarity with threat intelligence and threat hunting
Seniority level
  • Associate
Employment type
  • Full-time
Job function
  • Information Technology
Industries
  • Technology, Information and Internet
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Abu Dhabi, Abu Dhabi TAT IT Technolgies

Posted today

Job Viewed

Tap Again To Close

Job Description

We have an urgent requirement for Information Security Analyst for our client based at Abu Dhabi

Key Responsibilities

Penetration Testing and Red Teaming:
  • Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
  • Develop and execute custom tools and scripts to automate testing and exploitation processes.
  • Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
  • Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
  • ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
  • ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.

Vulnerability Assessment
  • Perform thorough vulnerability assessments to identify and prioritize security weaknesses.
  • Utilize industry-standard tools such as Qualys, Nessus or Nexpose and methodologies to uncover vulnerabilities in various environments.
  • Provide actionable recommendations for remediation and mitigation strategies.
  • Patch management

Threat Modeling And Risk Assessment
  • Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
  • Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
  • Provide recommendations for remediation and mitigation strategies

Incident Response And Crisis Management
  • Participate in security incident response and crisis management efforts as needed
  • Collaborate with incident response teams to contain and remediate security incidents
  • Provide technical expertise and guidance during incident response efforts

Security Research And Development
  • Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
  • Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
  • Participate in security research and development efforts to identify and develop new testing techniques and methodologies

Collaboration And Communication
  • Collaborate with development teams to implement security patches and fixes
  • Provide technical guidance and support to development teams on security-related issues
  • Communicate complex technical information to non-technical stakeholders in a clear and concise manner

Reporting And Documentation
  • Develop and maintain detailed reports on findings, including vulnerability assessments, penetration testing results, and recommendations for remediation
  • Document testing methodologies, tools, and results in a clear and concise manner
  • Maintain accurate and up-to-date records of testing activities and results

Mandatory Requirements
  • Bachelor's degree in Computer Science, Information Assurance, or a related field
  • OSCP, CEH, or other relevant certifications
  • 5+ years of experience in penetration testing, vulnerability assessment, or a related field
  • Strong understanding of networking protocols, operating systems, and applications
  • Proficiency in programming languages such as Python, C++, or Java
  • Experience with penetration testing frameworks and tools such as Nmap, Nessus, Burp Suite, or Metasploit
  • Strong analytical and problem-solving skills
  • Excellent communication and reporting skills
  • Ability to work independently and as part of a team
  • Strong attention to detail and ability to maintain accurate records
  • Ability to work in a fast-paced environment with tight deadlines

Preferred Additional Requirements
  • Experience with cloud-based technologies and cloud security
  • Familiarity with Agile development methodologies
  • Strong understanding of compliance and regulatory requirements (e.g., GDPR, PCI-DSS)
  • Experience with security orchestration, automation, and response (SOAR) tools
  • Familiarity with threat intelligence and threat hunting

Skills: security,information,penetration testing,vulnerability
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Abu Dhabi, Abu Dhabi Mindtel

Posted today

Job Viewed

Tap Again To Close

Job Description

Overview

Conduct penetration testing and red teaming on systems networks applications and mobile platforms to identify vulnerabilities. Develop and use custom tools/scripts to automate testing and exploitation. Simulate advanced persistent threats (APTs) to assess security controls and incident response. Continuously discover catalog and monitor all assets for attack surface management (ASM). Perform vulnerability assessments using industry-standard tools (e.g. Qualys Nessus Nexpose) and methodologies. Prioritize and provide actionable remediation recommendations for identified vulnerabilities. Participate in patch management activities. Conduct threat modeling and risk assessments to uncover and prioritize potential attack vectors. Collaborate with incident response teams to contain and remediate security incidents. Provide technical guidance and expertise during incident response and crisis management. Stay updated on latest security threats trends and tools; adapt testing methodologies as needed. Participate in security research and develop new testing techniques/methodologies. Work with development teams to implement security patches and provide security guidance. Communicate complex technical findings to both technical and non-technical stakeholders. Develop and maintain detailed documentation and reports on testing results methodologies and remediation steps. Maintain accurate records of all security testing and assessment activities. Ensure compliance with relevant security certifications and regulatory requirements. Demonstrate strong programming skills (e.g. Python C Java) and knowledge of security tools (e.g. Nmap Burp Suite Metasploit). Work independently and collaboratively in a fast-paced environment managing multiple priorities and deadlines.

Responsibilities
  • Conduct penetration testing and red teaming on systems networks applications and mobile platforms to identify vulnerabilities.
  • Develop and use custom tools/scripts to automate testing and exploitation.
  • Simulate advanced persistent threats (APTs) to assess security controls and incident response.
  • Continuously discover catalog and monitor all assets for attack surface management (ASM).
  • Perform vulnerability assessments using industry-standard tools (e.g. Qualys Nessus Nexpose) and methodologies.
  • Prioritize and provide actionable remediation recommendations for identified vulnerabilities.
  • Participate in patch management activities.
  • Conduct threat modeling and risk assessments to uncover and prioritize potential attack vectors.
  • Collaborate with incident response teams to contain and remediate security incidents.
  • Provide technical guidance and expertise during incident response and crisis management.
  • Stay updated on latest security threats trends and tools; adapt testing methodologies as needed.
  • Participate in security research and develop new testing techniques/methodologies.
  • Work with development teams to implement security patches and provide security guidance.
  • Communicate complex technical findings to both technical and non-technical stakeholders.
  • Develop and maintain detailed documentation and reports on testing results methodologies and remediation steps.
  • Maintain accurate records of all security testing and assessment activities.
  • Ensure compliance with relevant security certifications and regulatory requirements.
  • Demonstrate strong programming skills (e.g. Python C Java) and knowledge of security tools (e.g. Nmap Burp Suite Metasploit).
  • Work independently and collaboratively in a fast-paced environment managing multiple priorities and deadlines.
Qualifications
  • Strong programming skills (e.g. Python, C, Java).
  • Knowledge of security tools (Nmap, Burp Suite, Metasploit).
  • Ability to communicate complex technical findings to technical and non-technical stakeholders.
  • Experience with incident response, crisis management, and patch management activities.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security

AED120000 - AED180000 Y Global Software Solutions Group

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Purpose
The Information Security - Specialist will report directly to the Information Security Manager and will be responsible for implementing and managing security measures to protect the Bank's information assets. This role focuses on proactive threat detection, incident response, and vulnerability management across all technology domains, including endpoints and cloud environments. In collaboration with IS management, the Specialist will identify gaps in existing information security policies, standards, guidelines, and procedures, recommending updates to ensure alignment with regulatory requirements, industry best practices, and leading security standards.

JOB CONTEXT/ DIMENSIONS The IS Specialist will be responsible for overseeing security technologies like Cloud Security, DLP, Kubernetes, API security, SIEM and EDR, and ensuring compliance with standards and policies. Responsibilities include managing incident response, performing risk assessments, and optimizing security tools across cloud and network environments. The position requires collaboration with internal teams and external stakeholders to enhance security posture and mitigate threats.

Duties and Responsibilities:

  • Assist in developing and implementing the information security strategy and roadmap across all security technology domains
  • Research and analyze security standards, systems, and authentication protocols, providing recommendations to IS management
  • Review architectural security designs, Data flow and offer recommendations for approval by IS management
  • Enforce security policies and control across cloud environments to ensure a secure infrastructure
  • Manage and optimize CSPM tools to continuously monitor and enforce security best practices within cloud environments like Azure
  • Lead cloud incident response efforts, investigating and addressing threats in real-time to mitigate potential security risk
  • Lead the ongoing management of DLP technologies to protect sensitive data from unauthorized access and leakage
  • Regularly review and update DLP policies to reflect changes in business needs, technologies, and regulatory requirements
  • Identify and assess security risks in APIs and Kubernetes by evaluating access control, misconfigurations, and vulnerabilities
  • Enforce security policies and controls for APIs and Kubernetes
  • Oversee the management, optimization, and tuning of the SIEM platform to ensure effective security incident monitoring
  • Conduct deep-dive investigations into security alerts and collaborate with teams to resolve incidents efficiently
  • Conduct regular security audits and reviews to ensure compliance with internal policies and industry standards
  • Manage the deployment and operational effectiveness of EDR solutions to monitor, detect, and respond to endpoint threats
  • Lead incident response for security breaches, including investigation, containment, eradication, and recovery
  • Provide post-incident analysis, identify lessons learned, and improve future response strategies
  • Monitor the bank's networks for security breaches and investigate violations as they occur
  • Advise IS management on emerging security trends and best practices, assist in updating security policies and procedures, and support departments in investigating breaches and pursuing disciplinary or legal actions as needed
  • Contribute to team efforts by accomplishing related results as needed
  • Perform other duties as may be assigned by IS management.

Independence of Operation:

  • Work within framework of bank's information security policies, standards, guidelines and procedures as applicable
  • Work accomplishments will be reviewed by the Information Security Manager

Requirements
Education Level Required:

  • Bachelor's degree in computer science, Network/ Cyber Security or related information technology field.
  • Professional / Technical Qualifications / Diplomas: Platform specific (e.g., SIEM/ Networking/ Operating System) certifications.
  • Security (e.g. SANS/ ISC2 / CEH/ CISSP) certifications

Experience:

8 - 10 years' experience in Information Security or related field.

Information Security - Specialist

  • In-depth knowledge and understanding in information security and technology

infrastructure, ensuring robust protection of systems and applications.

  • Expertise in enforcing cloud security policies, IAM configurations, and data

protection practices to ensure a secure infrastructure.

  • Proficient in managing and optimizing CSPM tools to continuously monitor

and enforce security best practices.

  • Experienced in reviewing and enhancing security configurations and

architectures to align with industry best practices and compliance

requirements.

  • Proficient in managing API and Kubernetes security policies, including

implementing posture management, access controls, encryption, and

continuous monitoring to ensure a secure environment.

  • Skilled in conducting thorough vulnerability assessments and comprehensive

risk analyses, prioritizing risks and implementing remediation strategies to

secure systems.

  • Proficiency in configuring and managing DLP tools, data classification, policy

enforcement, risk assessment, compliance knowledge, and integrating with

security systems to prevent unauthorized data loss.

  • Skilled in configuring, optimizing, and managing Security Information and

Event Management (SIEM), EDR, DAM platforms for real-time threat

detection and effective incident response.

  • Committed to enhancing organizational security posture through ongoing

monitoring, assessment, and optimization of security tools and processes.

  • Demonstrates innovative thinking by exploring alternative approaches and

developing conceptual frameworks to address complex security challenges.

  • Possesses strong communication skills, capable of conveying complex security

concepts to senior non-technical stakeholders in clear, jargon-free language.

  • Adept at managing multiple concurrent projects, effectively prioritizing tasks

to meet organizational demands and deadlines.

This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security specialists Jobs in United Arab Emirates !

Information Security

AED120000 - AED250000 Y GSSTech Group

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Purpose

The Information Security - Specialist will report directly to the Information Security Manager and will be responsible for implementing and managing security measures to protect the Bank's information assets. This role focuses on proactive threat detection, incident response, and vulnerability management across all technology domains, including endpoints and cloud environments. In collaboration with IS management, the Specialist will identify gaps in existing information security policies, standards, guidelines, and procedures, recommending updates to ensure alignment with regulatory requirements, industry best practices, and leading security standards.

JOB CONTEXT/ DIMENSIONS The IS Specialist will be responsible for overseeing security technologies like Cloud Security, DLP, Kubernetes, API security, SIEM and EDR, and ensuring compliance with standards and policies. Responsibilities include managing incident response, performing risk assessments, and optimizing security tools across cloud and network environments. The position requires collaboration with internal teams and external stakeholders to enhance security posture and mitigate threats.

Duties and Responsibilities:

a) Assist in developing and implementing the information security strategy and roadmap across all security technology domains.

b) Research and analyze security standards, systems, and authentication protocols, providing recommendations to IS management.

c) Review architectural security designs, Data flow and offer recommendations for approval by IS management.

d) Enforce security policies and control across cloud environments to ensure a secure infrastructure.

e) Manage and optimize CSPM tools to continuously monitor and enforce security best practices within cloud environments like Azure.

f) Lead cloud incident response efforts, investigating and addressing threats in real-time to mitigate potential security risk.

g) Lead the ongoing management of DLP technologies to protect sensitive data from unauthorized access and leakage.

h) Regularly review and update DLP policies to reflect changes in business needs, technologies, and regulatory requirements.

i) Identify and assess security risks in APIs and Kubernetes by evaluating access control, misconfigurations, and vulnerabilities.

j) Enforce security policies and controls for APIs and Kubernetes.

k) Oversee the management, optimization, and tuning of the SIEM platform to ensure effective security incident monitoring.

l) Conduct deep-dive investigations into security alerts and collaborate with teams to resolve incidents efficiently.

m) Conduct regular security audits and reviews to ensure compliance with internal policies and industry standards.

n) Manage the deployment and operational effectiveness of EDR solutions to monitor, detect, and respond to endpoint threats.

o) Lead incident response for security breaches, including investigation, containment, eradication, and recovery.

p) Provide post-incident analysis, identify lessons learned, and improve future response strategies.

q) Monitor the bank's networks for security breaches and investigate violations as they occur.

r) Advise IS management on emerging security trends and best practices, assist in updating security policies and procedures, and support departments in investigating breaches and pursuing disciplinary or legal actions as needed.

s) Contribute to team efforts by accomplishing related results as needed.

t) Perform other duties as may be assigned by IS management.

Independence of Operation:


• Work within framework of bank's information security policies, standards, guidelines and procedures as applicable.


• Work accomplishments will be reviewed by the Information Security Manager.

Requirements

Education Level Required:

  • Bachelor's degree in computer science, Network/ Cyber Security or related information technology field.
  • Professional / Technical Qualifications / Diplomas: Platform specific (e.g., SIEM/ Networking/ Operating System) certifications.
  • Security (e.g. SANS/ ISC2 / CEH/ CISSP) certifications

Experience:

8 - 10 years' experience in Information Security or related field.

Information Security – Specialist


• In-depth knowledge and understanding in information security and technology

infrastructure, ensuring robust protection of systems and applications.


• Expertise in enforcing cloud security policies, IAM configurations, and data

protection practices to ensure a secure infrastructure.


• Proficient in managing and optimizing CSPM tools to continuously monitor

and enforce security best practices.


• Experienced in reviewing and enhancing security configurations and

architectures to align with industry best practices and compliance

requirements.


• Proficient in managing API and Kubernetes security policies, including

implementing posture management, access controls, encryption, and

continuous monitoring to ensure a secure environment.


• Skilled in conducting thorough vulnerability assessments and comprehensive

risk analyses, prioritizing risks and implementing remediation strategies to

secure systems.


• Proficiency in configuring and managing DLP tools, data classification, policy

enforcement, risk assessment, compliance knowledge, and integrating with

security systems to prevent unauthorized data loss.


• Skilled in configuring, optimizing, and managing Security Information and

Event Management (SIEM), EDR, DAM platforms for real-time threat

detection and effective incident response.


• Committed to enhancing organizational security posture through ongoing

monitoring, assessment, and optimization of security tools and processes.


• Demonstrates innovative thinking by exploring alternative approaches and

developing conceptual frameworks to address complex security challenges.


• Possesses strong communication skills, capable of conveying complex security

concepts to senior non-technical stakeholders in clear, jargon-free language.


• Adept at managing multiple concurrent projects, effectively prioritizing tasks

to meet organizational demands and deadlines.

This advertiser has chosen not to accept applicants from your region.

Information Security

Dubai, Dubai VAM Systems

Posted today

Job Viewed

Tap Again To Close

Job Description

We are currently seeking an Information Security Manager (Operations) for our UAE operations. The ideal candidate will have:

  1. 7-10 years of experience in Information Security or a related field.
  2. Strong Operations knowledge within the banking sector, with hands-on experience in implementing and managing IS applications such as EDR, SIEM, DLP .
  3. Network-related experience with a background in Computer Science, Network, or Cyber Security , along with relevant certifications.

Terms & Conditions:

  • Joining timeframe: Maximum 4 weeks .
  • Remote work: No .
  • Employment type: Full-time .

This job is currently active and accepting applications.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security

Sharjah, Sharjah Dicetek LLC

Posted today

Job Viewed

Tap Again To Close

Job Description

Designation
  • Project Manager – Information Security
Job Title

Project Manager – Information Security

Minimum Qualifications & Skills
  • An Engineering Degree, with 6+ Years experience in Information Security / Data Protection Project Management in BFSI.
  • Hands on experience in leading information security/ cyber security projects.
  • Proficient in application/ technology architectural security design principles, cyber threat assessments, software development life cycle, firewalls, data protection/ security, vulnerability scanning, application security, etc.
  • Demonstrated expertise in the management of technology and application risks and controls
  • Expertise in Information Security & Data Protection standards (like ISO 27001, PCI DSS, UAE IAS, SWIFT CSP, GDPR, UAE Data Protection, etc.).
  • Strong knowledge of information Security, Data Protection and Banking / IT Systems.
  • Ability to facilitate both technical and business discussions.
  • Strong analytical mindset that allows you to deeply understand topics
  • Excellent verbal and written communication skills combined with a knack for clear articulation
  • Knowledge of Microsoft Office, MS project, MS Share Point, JIRA, Asana or other project management tools
  • Certificates such as CISA, CISM, CISSP, Prince 2, PMP RMP, Agile PM, PMI-ACP, etc.
Job Responsibilities
  • Day-to-day management of information security projects requirements (agile and waterfall) for implementation of business applications and technology systems and including time, scope, budget, etc.
  • Manage the internal relationship with Information Technology (IT) and PMO process owners supporting the service, assisting with the definition and requirements of Information Security requirements in line with Bank's Information Security Policy.
  • Identification and proactive management of projects risks and issues
  • Supporting the EPMO / IT Project Managers to manage the backlog/requirement gathering and guide the team in balancing the priorities and scope
  • Ensure the implementation of business applications and technology solutions adhere to bank's information security policy and regulatory standards by cultivating a strong risk and control environment.
  • Drive transparent, quantifiable, and long-lasting control improvements by working together with the internal information security team and other project implementation team like EPMO, IT, Business teams, etc.
  • Provide clear direction to business, product, and technology stakeholders so they can manage their risks effectively.
  • Contribute to the creation of a culture of risk and control that is centered on proactive awareness of and enhancement of the control environments.
  • Work with the Contracts, Vendor Management and Compliance/Business departments to ensure that third-party suppliers contracts and operating-level agreements meet information security requirements.
  • Lead and oversee budget, staffing, and contracting
  • Work with and manage external vendors / auditors during assessments.
Employment type
  • Contract
Job function
  • Information Technology
Industries
  • IT Services and IT Consulting

Referrals increase your chances of interviewing at Dicetek LLC by 2x


#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Specialists Jobs