2 074 Security Specialists jobs in the United Arab Emirates
Information Security Analyst
Posted today
Job Viewed
Job Description
Date Opened
08/19/2025
Job Type
Full time
Job Opening Status
In-progress
Work Experience
5+ years
Industry
Technology
Salary
12500
City
Abu Dhabi
State/Province
Abu Dhabi
Country
United Arab Emirates
Zip/Postal Code
51133
About UsRaqmiyat is a UAE-based IT and digital transformation company specializing in consulting, staffing, and enterprise technology solutions. We empower banking, government, and enterprise clients across the Middle East to achieve their digital objectives.
Job DescriptionKey Responsibilities:
Penetration Testing and Red Teaming:
- Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
- Develop and execute custom tools and scripts to automate testing and exploitation processes.
- Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
- Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
- ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
- ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.
Threat Modeling and Risk Assessment:
- Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
- Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
- Provide recommendations for remediation and mitigation strategies
Incident Response and Crisis Management: - Participate in security incident response and crisis management efforts as needed
- Collaborate with incident response teams to contain and remediate security incidents
- Provide technical expertise and guidance during incident response efforts
- Security Research and Development:
- Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
- Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
- Participate in security research and development efforts to identify and develop new testing techniques and methodologies
Information Security Analyst
Posted today
Job Viewed
Job Description
We have an urgent requirement for Information Security Analyst for our client based at Abu Dhabi
Key Responsibilities
Penetration Testing and Red Teaming:
- Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
- Develop and execute custom tools and scripts to automate testing and exploitation processes.
- Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
- Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
- ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
- ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.
Vulnerability Assessment
- Perform thorough vulnerability assessments to identify and prioritize security weaknesses.
- Utilize industry-standard tools such as Qualys, Nessus or Nexpose and methodologies to uncover vulnerabilities in various environments.
- Provide actionable recommendations for remediation and mitigation strategies.
- Patch management
Threat Modeling And Risk Assessment
- Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
- Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
- Provide recommendations for remediation and mitigation strategies
Incident Response And Crisis Management
- Participate in security incident response and crisis management efforts as needed
- Collaborate with incident response teams to contain and remediate security incidents
- Provide technical expertise and guidance during incident response efforts
Security Research And Development
- Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
- Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
- Participate in security research and development efforts to identify and develop new testing techniques and methodologies
Collaboration And Communication
- Collaborate with development teams to implement security patches and fixes
- Provide technical guidance and support to development teams on security-related issues
- Communicate complex technical information to non-technical stakeholders in a clear and concise manner
Reporting And Documentation
- Develop and maintain detailed reports on findings, including vulnerability assessments, penetration testing results, and recommendations for remediation
- Document testing methodologies, tools, and results in a clear and concise manner
- Maintain accurate and up-to-date records of testing activities and results
Mandatory Requirements
- Bachelor's degree in Computer Science, Information Assurance, or a related field
- OSCP, CEH, or other relevant certifications
- 5+ years of experience in penetration testing, vulnerability assessment, or a related field
- Strong understanding of networking protocols, operating systems, and applications
- Proficiency in programming languages such as Python, C++, or Java
- Experience with penetration testing frameworks and tools such as Nmap, Nessus, Burp Suite, or Metasploit
- Strong analytical and problem-solving skills
- Excellent communication and reporting skills
- Ability to work independently and as part of a team
- Strong attention to detail and ability to maintain accurate records
- Ability to work in a fast-paced environment with tight deadlines
Preferred Additional Requirements
- Experience with cloud-based technologies and cloud security
- Familiarity with Agile development methodologies
- Strong understanding of compliance and regulatory requirements (e.g., GDPR, PCI-DSS)
- Experience with security orchestration, automation, and response (SOAR) tools
- Familiarity with threat intelligence and threat hunting
Skills: security,information,penetration testing,vulnerability
Information Security Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities:
Penetration Testing and Red Teaming:
- Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
- Develop and execute custom tools and scripts to automate testing and exploitation processes.
- Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
- Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
- ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
- ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.
Threat Modeling and Risk Assessment:
- Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
- Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
- Provide recommendations for remediation and mitigation strategiesIncident Response and Crisis Management:
- Participate in security incident response and crisis management efforts as needed
- Collaborate with incident response teams to contain and remediate security incidents
- Provide technical expertise and guidance during incident response efforts
- Security Research and Development:
- Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
- Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
- Participate in security research and development efforts to identify and develop new testing techniques and methodologies
Information Security Analyst
Posted today
Job Viewed
Job Description
We have an urgent requirement for Information Security Analyst for our client based at Abu Dhabi
Key Responsibilities- Penetration Testing and Red Teaming: Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
- Develop and execute custom tools and scripts to automate testing and exploitation processes.
- Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
- Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
- ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
- ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.
- Perform thorough vulnerability assessments to identify and prioritize security weaknesses.
- Utilize industry-standard tools such as Qualys, Nessus or Nexpose and methodologies to uncover vulnerabilities in various environments.
- Provide actionable recommendations for remediation and mitigation strategies.
- Patch management
- Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities.
- Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities.
- Provide recommendations for remediation and mitigation strategies.
- Participate in security incident response and crisis management efforts as needed.
- Collaborate with incident response teams to contain and remediate security incidents.
- Provide technical expertise and guidance during incident response efforts.
- Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly.
- Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies.
- Participate in security research and development efforts to identify and develop new testing techniques and methodologies.
- Collaborate with development teams to implement security patches and fixes.
- Provide technical guidance and support to development teams on security-related issues.
- Communicate complex technical information to non-technical stakeholders in a clear and concise manner.
- Develop and maintain detailed reports on findings, including vulnerability assessments, penetration testing results, and recommendations for remediation.
- Document testing methodologies, tools, and results in a clear and concise manner.
- Maintain accurate and up-to-date records of testing activities and results.
- Bachelor's degree in Computer Science, Information Assurance, or a related field
- OSCP, CEH, or other relevant certifications
- 5+ years of experience in penetration testing, vulnerability assessment, or a related field
- Strong understanding of networking protocols, operating systems, and applications
- Proficiency in programming languages such as Python, C++, or Java
- Experience with penetration testing frameworks and tools such as Nmap, Nessus, Burp Suite, or Metasploit
- Strong analytical and problem-solving skills
- Excellent communication and reporting skills
- Ability to work independently and as part of a team
- Strong attention to detail and ability to maintain accurate records
- Ability to work in a fast-paced environment with tight deadlines
- Experience with cloud-based technologies and cloud security
- Familiarity with Agile development methodologies
- Strong understanding of compliance and regulatory requirements (e.g., GDPR, PCI-DSS)
- Experience with security orchestration, automation, and response (SOAR) tools
- Familiarity with threat intelligence and threat hunting
- Associate
- Full-time
- Information Technology
- Technology, Information and Internet
Information Security Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities
Penetration Testing and Red Teaming:
- Conduct comprehensive penetration testing and red teaming exercises on systems, networks, applications and mobile to identify vulnerabilities and potential entry points for attackers.
- Develop and execute custom tools and scripts to automate testing and exploitation processes.
- Analyze and report on findings, providing detailed explanations of vulnerabilities and recommended remediation steps.
- Simulate advanced persistent threats (APTs) to test the resilience of security controls and incident response capabilities.
- ASM: Continuously discover and catalog all assets, including hardware, software, and network components.
- ASM: Monitor the attack surface for changes and potential vulnerabilities, using automated tools and manual assessments.
- Perform thorough vulnerability assessments to identify and prioritize security weaknesses.
- Utilize industry-standard tools such as Qualys, Nessus or Nexpose and methodologies to uncover vulnerabilities in various environments.
- Provide actionable recommendations for remediation and mitigation strategies.
- Patch management
- Conduct threat modeling and risk assessments to identify potential attack vectors and vulnerabilities
- Develop and maintain a comprehensive understanding of our systems, networks, and applications to identify potential vulnerabilities
- Provide recommendations for remediation and mitigation strategies
- Participate in security incident response and crisis management efforts as needed
- Collaborate with incident response teams to contain and remediate security incidents
- Provide technical expertise and guidance during incident response efforts
- Stay up-to-date with the latest security threats and trends, and adapt testing methodologies accordingly
- Develop and maintain a comprehensive knowledge of industry-leading security tools and technologies
- Participate in security research and development efforts to identify and develop new testing techniques and methodologies
- Collaborate with development teams to implement security patches and fixes
- Provide technical guidance and support to development teams on security-related issues
- Communicate complex technical information to non-technical stakeholders in a clear and concise manner
- Develop and maintain detailed reports on findings, including vulnerability assessments, penetration testing results, and recommendations for remediation
- Document testing methodologies, tools, and results in a clear and concise manner
- Maintain accurate and up-to-date records of testing activities and results
- Bachelor's degree in Computer Science, Information Assurance, or a related field
- OSCP, CEH, or other relevant certifications
- 5+ years of experience in penetration testing, vulnerability assessment, or a related field
- Strong understanding of networking protocols, operating systems, and applications
- Proficiency in programming languages such as Python, C++, or Java
- Experience with penetration testing frameworks and tools such as Nmap, Nessus, Burp Suite, or Metasploit
- Strong analytical and problem-solving skills
- Excellent communication and reporting skills
- Ability to work independently and as part of a team
- Strong attention to detail and ability to maintain accurate records
- Ability to work in a fast-paced environment with tight deadlines
- Experience with cloud-based technologies and cloud security
- Familiarity with Agile development methodologies
- Strong understanding of compliance and regulatory requirements (e.g., GDPR, PCI-DSS)
- Experience with security orchestration, automation, and response (SOAR) tools
- Familiarity with threat intelligence and threat hunting
#J-18808-Ljbffr
Information Security Analyst
Posted today
Job Viewed
Job Description
Conduct penetration testing and red teaming on systems networks applications and mobile platforms to identify vulnerabilities. Develop and use custom tools/scripts to automate testing and exploitation. Simulate advanced persistent threats (APTs) to assess security controls and incident response. Continuously discover catalog and monitor all assets for attack surface management (ASM). Perform vulnerability assessments using industry-standard tools (e.g. Qualys Nessus Nexpose) and methodologies. Prioritize and provide actionable remediation recommendations for identified vulnerabilities. Participate in patch management activities. Conduct threat modeling and risk assessments to uncover and prioritize potential attack vectors. Collaborate with incident response teams to contain and remediate security incidents. Provide technical guidance and expertise during incident response and crisis management. Stay updated on latest security threats trends and tools; adapt testing methodologies as needed. Participate in security research and develop new testing techniques/methodologies. Work with development teams to implement security patches and provide security guidance. Communicate complex technical findings to both technical and non-technical stakeholders. Develop and maintain detailed documentation and reports on testing results methodologies and remediation steps. Maintain accurate records of all security testing and assessment activities. Ensure compliance with relevant security certifications and regulatory requirements. Demonstrate strong programming skills (e.g. Python C Java) and knowledge of security tools (e.g. Nmap Burp Suite Metasploit). Work independently and collaboratively in a fast-paced environment managing multiple priorities and deadlines.
Responsibilities- Conduct penetration testing and red teaming on systems networks applications and mobile platforms to identify vulnerabilities.
- Develop and use custom tools/scripts to automate testing and exploitation.
- Simulate advanced persistent threats (APTs) to assess security controls and incident response.
- Continuously discover catalog and monitor all assets for attack surface management (ASM).
- Perform vulnerability assessments using industry-standard tools (e.g. Qualys Nessus Nexpose) and methodologies.
- Prioritize and provide actionable remediation recommendations for identified vulnerabilities.
- Participate in patch management activities.
- Conduct threat modeling and risk assessments to uncover and prioritize potential attack vectors.
- Collaborate with incident response teams to contain and remediate security incidents.
- Provide technical guidance and expertise during incident response and crisis management.
- Stay updated on latest security threats trends and tools; adapt testing methodologies as needed.
- Participate in security research and develop new testing techniques/methodologies.
- Work with development teams to implement security patches and provide security guidance.
- Communicate complex technical findings to both technical and non-technical stakeholders.
- Develop and maintain detailed documentation and reports on testing results methodologies and remediation steps.
- Maintain accurate records of all security testing and assessment activities.
- Ensure compliance with relevant security certifications and regulatory requirements.
- Demonstrate strong programming skills (e.g. Python C Java) and knowledge of security tools (e.g. Nmap Burp Suite Metasploit).
- Work independently and collaboratively in a fast-paced environment managing multiple priorities and deadlines.
- Strong programming skills (e.g. Python, C, Java).
- Knowledge of security tools (Nmap, Burp Suite, Metasploit).
- Ability to communicate complex technical findings to technical and non-technical stakeholders.
- Experience with incident response, crisis management, and patch management activities.
#J-18808-Ljbffr
Information Security
Posted today
Job Viewed
Job Description
Job Purpose
The Information Security - Specialist will report directly to the Information Security Manager and will be responsible for implementing and managing security measures to protect the Bank's information assets. This role focuses on proactive threat detection, incident response, and vulnerability management across all technology domains, including endpoints and cloud environments. In collaboration with IS management, the Specialist will identify gaps in existing information security policies, standards, guidelines, and procedures, recommending updates to ensure alignment with regulatory requirements, industry best practices, and leading security standards.
JOB CONTEXT/ DIMENSIONS The IS Specialist will be responsible for overseeing security technologies like Cloud Security, DLP, Kubernetes, API security, SIEM and EDR, and ensuring compliance with standards and policies. Responsibilities include managing incident response, performing risk assessments, and optimizing security tools across cloud and network environments. The position requires collaboration with internal teams and external stakeholders to enhance security posture and mitigate threats.
Duties and Responsibilities:
- Assist in developing and implementing the information security strategy and roadmap across all security technology domains
- Research and analyze security standards, systems, and authentication protocols, providing recommendations to IS management
- Review architectural security designs, Data flow and offer recommendations for approval by IS management
- Enforce security policies and control across cloud environments to ensure a secure infrastructure
- Manage and optimize CSPM tools to continuously monitor and enforce security best practices within cloud environments like Azure
- Lead cloud incident response efforts, investigating and addressing threats in real-time to mitigate potential security risk
- Lead the ongoing management of DLP technologies to protect sensitive data from unauthorized access and leakage
- Regularly review and update DLP policies to reflect changes in business needs, technologies, and regulatory requirements
- Identify and assess security risks in APIs and Kubernetes by evaluating access control, misconfigurations, and vulnerabilities
- Enforce security policies and controls for APIs and Kubernetes
- Oversee the management, optimization, and tuning of the SIEM platform to ensure effective security incident monitoring
- Conduct deep-dive investigations into security alerts and collaborate with teams to resolve incidents efficiently
- Conduct regular security audits and reviews to ensure compliance with internal policies and industry standards
- Manage the deployment and operational effectiveness of EDR solutions to monitor, detect, and respond to endpoint threats
- Lead incident response for security breaches, including investigation, containment, eradication, and recovery
- Provide post-incident analysis, identify lessons learned, and improve future response strategies
- Monitor the bank's networks for security breaches and investigate violations as they occur
- Advise IS management on emerging security trends and best practices, assist in updating security policies and procedures, and support departments in investigating breaches and pursuing disciplinary or legal actions as needed
- Contribute to team efforts by accomplishing related results as needed
- Perform other duties as may be assigned by IS management.
Independence of Operation:
- Work within framework of bank's information security policies, standards, guidelines and procedures as applicable
- Work accomplishments will be reviewed by the Information Security Manager
Requirements
Education Level Required:
- Bachelor's degree in computer science, Network/ Cyber Security or related information technology field.
- Professional / Technical Qualifications / Diplomas: Platform specific (e.g., SIEM/ Networking/ Operating System) certifications.
- Security (e.g. SANS/ ISC2 / CEH/ CISSP) certifications
Experience:
8 - 10 years' experience in Information Security or related field.
Information Security - Specialist
- In-depth knowledge and understanding in information security and technology
infrastructure, ensuring robust protection of systems and applications.
- Expertise in enforcing cloud security policies, IAM configurations, and data
protection practices to ensure a secure infrastructure.
- Proficient in managing and optimizing CSPM tools to continuously monitor
and enforce security best practices.
- Experienced in reviewing and enhancing security configurations and
architectures to align with industry best practices and compliance
requirements.
- Proficient in managing API and Kubernetes security policies, including
implementing posture management, access controls, encryption, and
continuous monitoring to ensure a secure environment.
- Skilled in conducting thorough vulnerability assessments and comprehensive
risk analyses, prioritizing risks and implementing remediation strategies to
secure systems.
- Proficiency in configuring and managing DLP tools, data classification, policy
enforcement, risk assessment, compliance knowledge, and integrating with
security systems to prevent unauthorized data loss.
- Skilled in configuring, optimizing, and managing Security Information and
Event Management (SIEM), EDR, DAM platforms for real-time threat
detection and effective incident response.
- Committed to enhancing organizational security posture through ongoing
monitoring, assessment, and optimization of security tools and processes.
- Demonstrates innovative thinking by exploring alternative approaches and
developing conceptual frameworks to address complex security challenges.
- Possesses strong communication skills, capable of conveying complex security
concepts to senior non-technical stakeholders in clear, jargon-free language.
- Adept at managing multiple concurrent projects, effectively prioritizing tasks
to meet organizational demands and deadlines.
Be The First To Know
About the latest Security specialists Jobs in United Arab Emirates !
Information Security
Posted today
Job Viewed
Job Description
Job Purpose
The Information Security - Specialist will report directly to the Information Security Manager and will be responsible for implementing and managing security measures to protect the Bank's information assets. This role focuses on proactive threat detection, incident response, and vulnerability management across all technology domains, including endpoints and cloud environments. In collaboration with IS management, the Specialist will identify gaps in existing information security policies, standards, guidelines, and procedures, recommending updates to ensure alignment with regulatory requirements, industry best practices, and leading security standards.
JOB CONTEXT/ DIMENSIONS The IS Specialist will be responsible for overseeing security technologies like Cloud Security, DLP, Kubernetes, API security, SIEM and EDR, and ensuring compliance with standards and policies. Responsibilities include managing incident response, performing risk assessments, and optimizing security tools across cloud and network environments. The position requires collaboration with internal teams and external stakeholders to enhance security posture and mitigate threats.
Duties and Responsibilities:
a) Assist in developing and implementing the information security strategy and roadmap across all security technology domains.
b) Research and analyze security standards, systems, and authentication protocols, providing recommendations to IS management.
c) Review architectural security designs, Data flow and offer recommendations for approval by IS management.
d) Enforce security policies and control across cloud environments to ensure a secure infrastructure.
e) Manage and optimize CSPM tools to continuously monitor and enforce security best practices within cloud environments like Azure.
f) Lead cloud incident response efforts, investigating and addressing threats in real-time to mitigate potential security risk.
g) Lead the ongoing management of DLP technologies to protect sensitive data from unauthorized access and leakage.
h) Regularly review and update DLP policies to reflect changes in business needs, technologies, and regulatory requirements.
i) Identify and assess security risks in APIs and Kubernetes by evaluating access control, misconfigurations, and vulnerabilities.
j) Enforce security policies and controls for APIs and Kubernetes.
k) Oversee the management, optimization, and tuning of the SIEM platform to ensure effective security incident monitoring.
l) Conduct deep-dive investigations into security alerts and collaborate with teams to resolve incidents efficiently.
m) Conduct regular security audits and reviews to ensure compliance with internal policies and industry standards.
n) Manage the deployment and operational effectiveness of EDR solutions to monitor, detect, and respond to endpoint threats.
o) Lead incident response for security breaches, including investigation, containment, eradication, and recovery.
p) Provide post-incident analysis, identify lessons learned, and improve future response strategies.
q) Monitor the bank's networks for security breaches and investigate violations as they occur.
r) Advise IS management on emerging security trends and best practices, assist in updating security policies and procedures, and support departments in investigating breaches and pursuing disciplinary or legal actions as needed.
s) Contribute to team efforts by accomplishing related results as needed.
t) Perform other duties as may be assigned by IS management.
Independence of Operation:
• Work within framework of bank's information security policies, standards, guidelines and procedures as applicable.
• Work accomplishments will be reviewed by the Information Security Manager.
Education Level Required:
- Bachelor's degree in computer science, Network/ Cyber Security or related information technology field.
- Professional / Technical Qualifications / Diplomas: Platform specific (e.g., SIEM/ Networking/ Operating System) certifications.
- Security (e.g. SANS/ ISC2 / CEH/ CISSP) certifications
Experience:
8 - 10 years' experience in Information Security or related field.
Information Security – Specialist
• In-depth knowledge and understanding in information security and technology
infrastructure, ensuring robust protection of systems and applications.
• Expertise in enforcing cloud security policies, IAM configurations, and data
protection practices to ensure a secure infrastructure.
• Proficient in managing and optimizing CSPM tools to continuously monitor
and enforce security best practices.
• Experienced in reviewing and enhancing security configurations and
architectures to align with industry best practices and compliance
requirements.
• Proficient in managing API and Kubernetes security policies, including
implementing posture management, access controls, encryption, and
continuous monitoring to ensure a secure environment.
• Skilled in conducting thorough vulnerability assessments and comprehensive
risk analyses, prioritizing risks and implementing remediation strategies to
secure systems.
• Proficiency in configuring and managing DLP tools, data classification, policy
enforcement, risk assessment, compliance knowledge, and integrating with
security systems to prevent unauthorized data loss.
• Skilled in configuring, optimizing, and managing Security Information and
Event Management (SIEM), EDR, DAM platforms for real-time threat
detection and effective incident response.
• Committed to enhancing organizational security posture through ongoing
monitoring, assessment, and optimization of security tools and processes.
• Demonstrates innovative thinking by exploring alternative approaches and
developing conceptual frameworks to address complex security challenges.
• Possesses strong communication skills, capable of conveying complex security
concepts to senior non-technical stakeholders in clear, jargon-free language.
• Adept at managing multiple concurrent projects, effectively prioritizing tasks
to meet organizational demands and deadlines.
Information Security
Posted today
Job Viewed
Job Description
We are currently seeking an Information Security Manager (Operations) for our UAE operations. The ideal candidate will have:
- 7-10 years of experience in Information Security or a related field.
- Strong Operations knowledge within the banking sector, with hands-on experience in implementing and managing IS applications such as EDR, SIEM, DLP .
- Network-related experience with a background in Computer Science, Network, or Cyber Security , along with relevant certifications.
Terms & Conditions:
- Joining timeframe: Maximum 4 weeks .
- Remote work: No .
- Employment type: Full-time .
This job is currently active and accepting applications.
#J-18808-LjbffrInformation Security
Posted today
Job Viewed
Job Description
- Project Manager – Information Security
Project Manager – Information Security
Minimum Qualifications & Skills- An Engineering Degree, with 6+ Years experience in Information Security / Data Protection Project Management in BFSI.
- Hands on experience in leading information security/ cyber security projects.
- Proficient in application/ technology architectural security design principles, cyber threat assessments, software development life cycle, firewalls, data protection/ security, vulnerability scanning, application security, etc.
- Demonstrated expertise in the management of technology and application risks and controls
- Expertise in Information Security & Data Protection standards (like ISO 27001, PCI DSS, UAE IAS, SWIFT CSP, GDPR, UAE Data Protection, etc.).
- Strong knowledge of information Security, Data Protection and Banking / IT Systems.
- Ability to facilitate both technical and business discussions.
- Strong analytical mindset that allows you to deeply understand topics
- Excellent verbal and written communication skills combined with a knack for clear articulation
- Knowledge of Microsoft Office, MS project, MS Share Point, JIRA, Asana or other project management tools
- Certificates such as CISA, CISM, CISSP, Prince 2, PMP RMP, Agile PM, PMI-ACP, etc.
- Day-to-day management of information security projects requirements (agile and waterfall) for implementation of business applications and technology systems and including time, scope, budget, etc.
- Manage the internal relationship with Information Technology (IT) and PMO process owners supporting the service, assisting with the definition and requirements of Information Security requirements in line with Bank's Information Security Policy.
- Identification and proactive management of projects risks and issues
- Supporting the EPMO / IT Project Managers to manage the backlog/requirement gathering and guide the team in balancing the priorities and scope
- Ensure the implementation of business applications and technology solutions adhere to bank's information security policy and regulatory standards by cultivating a strong risk and control environment.
- Drive transparent, quantifiable, and long-lasting control improvements by working together with the internal information security team and other project implementation team like EPMO, IT, Business teams, etc.
- Provide clear direction to business, product, and technology stakeholders so they can manage their risks effectively.
- Contribute to the creation of a culture of risk and control that is centered on proactive awareness of and enhancement of the control environments.
- Work with the Contracts, Vendor Management and Compliance/Business departments to ensure that third-party suppliers contracts and operating-level agreements meet information security requirements.
- Lead and oversee budget, staffing, and contracting
- Work with and manage external vendors / auditors during assessments.
- Contract
- Information Technology
- IT Services and IT Consulting
Referrals increase your chances of interviewing at Dicetek LLC by 2x
#J-18808-Ljbffr