58 Vulnerability Assessments jobs in Dubai
Security Analyst
Posted today
Job Viewed
Job Description
Help AG is looking for a talented and enthusiastic Security Analyst who will have a strong knowledge and interest in network security. The Security Analyst will be responsible for monitoring multiple security technologies and events using the Security Information Event Management (SIEM) tool in order to detect and identify IT security related incidents.
This role requires:
- 2-4 years of experience in information security, in areas such as security operations, intrusion detection, incident analysis, incident handling, log analysis, or firewall administration.
- 2-4 years of experience in one of the following: Network operations or engineering or system administration on Unix, Linux, Windows.
Responsibilities
- Follow detailed operational processes and procedures to appropriately analyze, escalate, and assist in the remediation of critical information security incidents.
- Correlate and analyze events using the Splunk/Log Rhythm/Qradar SIEM tool to detect IT security incidents.
- Conduct analysis of log files, including forensic analysis of system resource access.
- Review customer reports to ensure quality and accuracy.
- Monitor multiple security technologies, such as SIEM, IDS/IPS, Firewalls, Switches, VPNs, and other security threat data sources.
- Respond to inbound requests via phone and other electronic means for technical assistance with managed services.
- Respond in a timely manner (within documented SLA) to support, threat, and other cases.
- Document actions in cases to effectively communicate information internally and to customers.
- Resolve problems independently and understand escalation procedures.
- Maintain a high degree of awareness of the current threat landscape.
- Participate in knowledge sharing with other analysts and writing technical articles for Internal Knowledge Bases.
- Perform other essential duties as assigned.
- Able to work in rotating shifts within a 24/7 operating environment.
Qualifications & Skills
- A Degree in Computer Science, Information Systems, Electrical Engineering, or a closely related degree.
- An active interest in internet security, incident detection, network and systems security.
- A sound knowledge of IT security best practices, common attack types and detection/prevention methods.
- Demonstrable experience of analyzing and interpreting system, security, and application logs.
- Knowledge of the type of events that both Firewalls, IDS/IPS, and other security-related devices produce.
- Experience in using SIEM tools such as Splunk, Log Rhythm, Qradar, Alien Vault, NitroSecurity, etc.
- TCP/IP knowledge, networking, and security product experience.
- Knowledge of Cyber Kill Chain and MITRE ATT&CK frameworks.
- Possible attack activities, such as scans, man in the middle, sniffing, DoS, DDoS, etc., and possible abnormal activities, such as worms, Trojans, viruses, etc.
- CCNA, CISSP, GCA, GCIA, GCIH, CEH certification would be preferable.
- Outstanding organizational skills.
- Exclusive focus and vast experience in IT.
- Strong analytical and problem-solving skills.
- A motivated, self-managed individual who can demonstrate above-average analytical skills and work professionally with peers and customers even under pressure.
- Very good communication skills.
- Strong written and verbal skills.
- Strong interpersonal skills with the ability to collaborate well with others.
- Ability to speak and write in English is required; Arabic is preferred.
Benefits
- Health insurance with one of the leading global providers for medical insurance.
- Career progression and growth through challenging projects and work.
- Employee engagement and wellness campaigns activities throughout the year.
- Excellent learning and development opportunities.
- Inclusive and diverse working environment.
- Flexible/Hybrid working environment.
- Annual flight tickets to home country.
- Open door policy.
About Us
Help AG is the cybersecurity arm of e& enterprise (formerly Etisalat Digital) and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by e& (formerly Etisalat Group) in 2020, hence creating a cybersecurity and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and maintaining its focus on all aspects of cybersecurity. With best of breed technologies from industry-leading vendor partners, expertly qualified service delivery teams, and a state-of-the-art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
#J-18808-LjbffrInformation Security Analyst
Posted today
Job Viewed
Job Description
Dubai, United Arab Emirates | Posted on 16/06/2025
IFZA Dubai is the most dynamic and truly international Free Zone Community in the UAE, optimizing the country's strategic location and world-class infrastructure. We provide easy, reliable, and fast company formation services through our network of Professional Partners and Government Authorities.
Job Overview:
The Information Security Analyst will be responsible for protecting IFZA's information systems by identifying, assessing, and mitigating security risks. This role involves monitoring, analyzing, and responding to security incidents, implementing security measures, and ensuring compliance with industry standards and regulations. The ideal candidate is proactive, detail-oriented, and possesses strong technical and analytical skills.
Main Responsibilities:
- Threat Monitoring and Incident Response :
- Monitor network traffic and security alerts for potential threats using SIEM tools (e.g., Microsoft Sentinel).
- Investigate and respond to security incidents, including malware infections, phishing attacks, and unauthorized access.
- Conduct root cause analysis and document incident reports with remediation recommendations.
- Risk Assessment and Vulnerability Management :
- Perform regular vulnerability scans and penetration testing to identify weaknesses in systems and applications.
- Collaborate with IT teams to prioritize and remediate vulnerabilities.
- Conduct risk assessments to evaluate potential security threats and recommend mitigation strategies.
- Security Policy and Compliance :
- Implement, and enforce security policies, procedures, and standards in alignment with frameworks such as NIST, ISO 27001, or GDPR.
- Ensure compliance with regulatory requirements and industry’s best practices.
- Assist in preparing for and responding to internal and external audits.
- Security Awareness and Training :
- Conduct security awareness training for employees to promote best practices (e.g., password management, phishing prevention).
- Create and distribute educational materials on emerging cyber threats.
- System and Network Security :
- Configure and manage security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection solutions.
- Implement and monitor encryption, authentication, and access control mechanisms.
- Threat Intelligence and Research :
- Stay updated on the latest cyber threats, vulnerabilities, and attack vectors.
- Analyze threat intelligence reports and apply findings to enhance organizational security posture.
- Bachelor’s in Engineering , Computer Science, or related field.
- 8+ years of experience in Information Security.
- Minimum 3 + years hands-on experience in SOC, blue-team, or security engineering roles.
- Proven expertise with Microsoft Sentinel, Microsoft Defender, Incident management, Compromised recovery, patch management and vulnerability management platform .
- Solid grasp of TCP/IP, Windows/Linux internals, AWS/Azure security primitives.
- Scripting for automation (Python, Bash, or PowerShell).
- Familiarity with MITRE ATTACK mapping and threat-hunting methodology.
- CompTIA Security+, CEH, GRC, CCNA or CCNP - Security.
- Analytical mindset with strong investigation and documentation discipline.
- Clear verbal/written communication for incident briefings and executive reports.
- Ability to multitask and stay calm under pressure.
- Experience with Zero Trust architecture projects.
- Knowledge of privacy regulations (GDPR, HIPAA, PDPA).
- Exposure to DevSecOps .
- International team (over 60 nationalities)
- 24 working days as annual leave
- Annual flight home
- Life insurance plan
- Medical insurance plan (with the option to upgrade at your own cost)
Information Security Analyst
Posted today
Job Viewed
Job Description
Join to apply for the Information Security Analyst role at International Free Zone Authority | IFZA
Join to apply for the Information Security Analyst role at International Free Zone Authority | IFZA
Job Overview:
The Information Security Analyst will be responsible for protecting IFZA's information systems by identifying, assessing, and mitigating security risks. This role involves monitoring, analyzing, and responding to security incidents, implementing security measures, and ensuring compliance with industry standards and regulations. The ideal candidate is proactive, detail-oriented, and possesses strong technical and analytical skills.
Main Responsibilities:
- Threat Monitoring and Incident Response:
- Monitor network traffic and security alerts for potential threats using SIEM tools (e.g., Microsoft Sentinel).
- Investigate and respond to security incidents, including malware infections, phishing attacks, and unauthorized access.
- Conduct root cause analysis and document incident reports with remediation recommendations.
- Risk Assessment and Vulnerability Management:
- Perform regular vulnerability scans and penetration testing to identify weaknesses in systems and applications.
- Collaborate with IT teams to prioritize and remediate vulnerabilities.
- Conduct risk assessments to evaluate potential security threats and recommend mitigation strategies.
- Security Policy and Compliance:
- Implement, and enforce security policies, procedures, and standards in alignment with frameworks such as NIST, ISO 27001, or GDPR.
- Ensure compliance with regulatory requirements and industry's best practices.
- Assist in preparing for and responding to internal and external audits.
- Security Awareness and Training:
- Conduct security awareness training for employees to promote best practices (e.g., password management, phishing prevention).
- Create and distribute educational materials on emerging cyber threats.
- System and Network Security:
- Configure and manage security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection solutions.
- Implement and monitor encryption, authentication, and access control mechanisms.
- Threat Intelligence and Research:
- Stay updated on the latest cyber threats, vulnerabilities, and attack vectors.
- Analyze threat intelligence reports and apply findings to enhance organizational security posture.
- Bachelor's in Engineering, Computer Science, or related field.
- 8+ years of experience in Information Security.
- Minimum 3 + years hands-on experience in SOC, blue-team, or security engineering roles.
- Proven expertise with Microsoft Sentinel, Microsoft Defender, Incident management, Compromised recovery, patch management and vulnerability management platform.
- Solid grasp of TCP/IP, Windows/Linux internals, AWS/Azure security primitives.
- Scripting for automation (Python, Bash, or PowerShell).
- Familiarity with MITRE ATTACK mapping and threat-hunting methodology.
- CompTIA Security+, CEH, GRC, CCNA or CCNP - Security.
- Analytical mindset with strong investigation and documentation discipline.
- Clear verbal/written communication for incident briefings and executive reports.
- Ability to multitask and stay calm under pressure.
- Experience with Zero Trust architecture projects.
- Knowledge of privacy regulations (GDPR, HIPAA, PDPA).
- Exposure to DevSecOps.
- International team (over 60 nationalities)
- 24 working days as annual leave
- Annual flight home
- Life insurance plan
- Medical insurance plan (with the option to upgrade at your own cost)
- Seniority level Associate
- Employment type Full-time
- Job function Information Technology
- Industries IT Services and IT Consulting
Referrals increase your chances of interviewing at International Free Zone Authority | IFZA by 2x
Get notified about new Information Security Analyst jobs in Dubai, Dubai, United Arab Emirates.
Manager, SOC Governance & Regulatory Compliance - RiskDubai, Dubai, United Arab Emirates 2 hours ago
Information Security - Identity & Access Governance Information Technology Security Engineer - Azure Penetration Testing Consultant / Cyber Security Analyst – Red Team Cyber Security Analyst - UAE National Only Senior Cybsersecurity Governance Analyst Analyst (UAE National)– Cyber Security & Data Analytics Engineer - information Security -UAE Nationals Only Engineer - information Security -UAE Nationals Only Risk & Quality - Information Security Analyst- Associate - UAE Risk & Quality - Information Security Analyst- Associate - UAE Risk & Quality - Information Security Analyst- Associate - UAEWe're unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrCyber Security Analyst
Posted today
Job Viewed
Job Description
Press Tab to Move to Skip to Content Link
Search by Location
Select how often (in days) to receive an alert:
Select how often (in days) to receive an alert:
Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients' most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at
Job DescriptionRole Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
- Ensuring customer centricity by providing apt cybersecurity
- Monitoring and safeguarding the log sources and security access
- Planning for disaster recovery in the event of any security breaches
- Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
- Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
- Conduct security assessments, risk analysis and root cause analysis of security incidents
- Handling incidents escalated by the L1 team in 24x7 rotational shifts
- Use advanced analytics tools to determine emerging threat patterns and vulnerabilities
- Completing all tactical security operations tasks associated with this engagement.
- Analyses all the attacks and come up with remedial attack analysis
- Conduct detailed analysis of incidents and create reports and dashboards
- Stakeholder coordination & audit assistance
- Liaise with stakeholders in relation to cyber security issues and provide future recommendations
- Maintain an information security risk register and assist with internal and external audits relating to information security
- Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues
- Advice and guidance to employees on issues such as spam and unwanted or malicious emails
No.
Performance Parameter
Measure
1.
Customer centricity
Timely security breach solutioning to end users, Internal stakeholders & external customers experience
2.
Process Adherence
Adherence to SLA's (90-95%), response time and resolution time TAT
͏ ͏ Mandatory Skills: QRadar.Experience: 3-5 Years.Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.If you encounter any suspicious mail, advertisements, or persons who offer jobs at Wipro, please email us . Do not email your resume to this ID as it is not monitored for resumes and career applications.
Any complaints or concerns regarding unethical/unfair hiring practices should be directed to our Ombuds Group .
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, caste, creed, religion, gender, marital status, age, ethnic and national origin, gender identity, gender expression, sexual orientation, political orientation, disability status, protected veteran status, or any other characteristic protected by law.
Wipro is committed to creating an accessible, supportive, and inclusive workplace. Reasonable accommodation will be provided to all applicants including persons with disabilities, throughout the recruitment and selection process. Accommodations must be communicated in advance of the application, where possible, and will be reviewed on an individual basis. Wipro provides equal opportunities to all and values diversity.
#J-18808-LjbffrCyber Security Analyst - L4
Posted today
Job Viewed
Job Description
Press Tab to Move to Skip to Content Link
Search by Location
Select how often (in days) to receive an alert:
Select how often (in days) to receive an alert:
Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at Job Description
Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
- Ensuring customer centricity by providing apt cybersecurity
- Monitoring and safeguarding the log sources and security access
- Planning for disaster recovery in the event of any security breaches
- Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
- Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
- Conduct security assessments, risk analysis and root cause analysis of security incidents
- Handling incidents escalated by the L1 team in 24x7 rotational shifts
- Use advanced analytics tools to determine emerging threat patterns and vulnerabilities
- Completing all tactical security operations tasks associated with this engagement.
- Analyses all the attacks and come up with remedial attack analysis
- Conduct detailed analysis of incidents and create reports and dashboards
- Stakeholder coordination & audit assistance
- Liaise with stakeholders in relation to cyber security issues and provide future recommendations
- Maintain an information security risk register and assist with internal and external audits relating to information security
- Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues
- Advice and guidance to employees on issues such as spam and unwanted or malicious emails
No.
Performance Parameter
Measure
1.
Customer centricity
Timely security breach solutioning to end users, Internal stakeholders & external customers experience
2.
Process Adherence
Adherence to SLAâs (90-95%), response time and resolution time TAT
͏ ͏ Mandatory Skills: Antivirus Microsoft EDR XDR.Experience: 5-8 Years.Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.If you encounter any suspicious mail, advertisements, or persons who offer jobs at Wipro, please email us at . Do not email your resume to this ID as it is not monitored for resumes and career applications.
Any complaints or concerns regarding unethical/unfair hiring practices should be directed to our Ombuds Group at .
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, caste, creed, religion, gender, marital status, age, ethnic and national origin, gender identity, gender expression, sexual orientation, political orientation, disability status, protected veteran status, or any other characteristic protected by law.
Wipro is committed to creating an accessible, supportive, and inclusive workplace. Reasonable accommodation will be provided to all applicants including persons with disabilities, throughout the recruitment and selection process. Accommodations must be communicated in advance of the application, where possible, and will be reviewed on an individual basis. Wipro provides equal opportunities to all and values diversity.
#J-18808-LjbffrCyber Security Analyst - L3
Posted today
Job Viewed
Job Description
Press Tab to Move to Skip to Content Link
Search by Location
Select how often (in days) to receive an alert:
Select how often (in days) to receive an alert:
Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at Job Description
Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
- Ensuring customer centricity by providing apt cybersecurity
- Monitoring and safeguarding the log sources and security access
- Planning for disaster recovery in the event of any security breaches
- Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
- Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
- Conduct security assessments, risk analysis and root cause analysis of security incidents
- Handling incidents escalated by the L1 team in 24x7 rotational shifts
- Use advanced analytics tools to determine emerging threat patterns and vulnerabilities
- Completing all tactical security operations tasks associated with this engagement.
- Analyses all the attacks and come up with remedial attack analysis
- Conduct detailed analysis of incidents and create reports and dashboards
- Stakeholder coordination & audit assistance
- Liaise with stakeholders in relation to cyber security issues and provide future recommendations
- Maintain an information security risk register and assist with internal and external audits relating to information security
- Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues
- Advice and guidance to employees on issues such as spam and unwanted or malicious emails
No.
Performance Parameter
Measure
1.
Customer centricity
Timely security breach solutioning to end users, Internal stakeholders & external customers experience
2.
Process Adherence
Adherence to SLA’s (90-95%), response time and resolution time TAT
͏ ͏ Mandatory Skills: QRadar.Experience: 3-5 Years.Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.If you encounter any suspicious mail, advertisements, or persons who offer jobs at Wipro, please email us at . Do not email your resume to this ID as it is not monitored for resumes and career applications.
Any complaints or concerns regarding unethical/unfair hiring practices should be directed to our Ombuds Group at .
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, caste, creed, religion, gender, marital status, age, ethnic and national origin, gender identity, gender expression, sexual orientation, political orientation, disability status, protected veteran status, or any other characteristic protected by law.
Wipro is committed to creating an accessible, supportive, and inclusive workplace. Reasonable accommodation will be provided to all applicants including persons with disabilities, throughout the recruitment and selection process. Accommodations must be communicated in advance of the application, where possible, and will be reviewed on an individual basis. Wipro provides equal opportunities to all and values diversity.
#J-18808-LjbffrCyber Security Analyst – Emirati Talent
Posted today
Job Viewed
Job Description
The primary function of this role is to monitor the ENOC environment on a 24/7 basis and conduct initial analyses for events to identify any cyber security threats or attacks on ENOC IT/OT assets. In addition to performing first response assessments of the cyber security incidents and escalating to Senior Security Analyst for further investigation and response as per approved policies, processes, and procedures.
Principal Accountabilities
- Follow response procedures and other CIC related SOPs based on the incident impact analysis & predetermined response actions procedures.
- Acknowledge, analyse and validate vulnerabilities/incidents triggered from correlated events through SIEM or other security solutions.
- Acknowledge, analyse and validate incidents received through other reporting mechanisms such as email, phone calls, management directions, etc.
- Gain knowledge of existing policies, standards, procedures, and guidelines to prevent the unauthorized use, release, modification, or destruction of ENOC information assets.
- Gain an understanding of security risks and controls.
- Undertake first stages of false positive and false negative analysis.
- Perform analysis of log files to collect more contextual information in order to triage security events.
- Review and align priority, severity and classification of security incidents.
- Collect contextual information and pursue technical root cause analysis & attack method analysis.
- Conduct analysis of the events/incidents to identify potential deficiencies in deployed controls that led to the incident materializing.
- Analyse reported cyber security events and incidents and recommend remediation and improvement actions.
- Provide functional support and content development and improvements for the SIEM and other security technologies used by CIC.
- Coordinate with internal and external stakeholders to handle cyber incidents as per approved SOPs and management directions.
- Participate in post-incident reviews and recommend improvement plans.
- Investigate, document, and report on information security issues and emerging trends.
- Should be on-call 24 hours per day to respond to security emergencies or other related problems.
- Should work on shifts schedule which includes weekends.
Education
- Degree: Bachelor's degree in Computer Science, Engineering or Business field or equivalent, Diploma with additional relevant experience.
- Professional certificate such as CISSP, GCTI, GCFA, GNFA will be beneficial.
Experience
- 5+ years of Information security or technology experience.
- Working experience in multiple industries (e.g. Energy, Utilities, Retail, Government…) is preferable.
- Working experience in cyber security threats monitoring and handling.
- Exposure to OT security operation center experience will be a plus.
Mid-Senior level
Employment typeFull-time
Job functionInformation Technology
IndustriesOil and Gas
#J-18808-LjbffrBe The First To Know
About the latest Vulnerability assessments Jobs in Dubai !
Interview Questions for Information Security Analyst
Posted today
Job Viewed
Job Description
Login for faster access to the best deals. Click here if you don't have an account.
Interview Questions for Information Security Analyst Jun 25th, 2025 at 05:44 Learning Dubai 10 views Reference: 5123 Contact us Location: Dubai Price: Contact usInterview Questions for Information Security Analyst roles often focus on key areas like risk management, network security, incident response, and vulnerability assessment. Candidates may be asked about common security tools, threat detection techniques, encryption methods, and how they would handle real-world security incidents. Preparing for these questions helps build confidence and demonstrates the technical knowledge and problem-solving skills required for a successful career in information security.
Send a message #J-18808-LjbffrRisk Management
Posted today
Job Viewed
Job Description
Join to apply for the Risk Management role at Dubai Careers - A Smart Dubai Initiative .
Job Description
مجال إدارة المخاطر
التخصص:
- محلل مخاطر – Risk Analyst
- إدارة مخاطر – Risk Management
- تخفيف مخاطر - Risk mitigation
المهام:
- تقييم وتحليل المخاطر
- إعداد تقارير المخاطر
- تطوير نماذج تحليل المخاطر
- تطوير استراتيجيات إدارة المخاطر
- مراقبة وتحليل المخاطر بشكل مستمر
- تحديد أولويات المخاطر
- وضع استراتيجيات لتخفيف المخاطر
Qualifications
ماجستير في الاستراتيجية أو الإدارة أو ما يعادله في تخصص مشابه + خبرة عملية في ذات المجال لا تقل عن 3 سنوات.
أو بكالوريوس في الاستراتيجية أو الإدارة أو ما يعادله في تخصص مشابه + خبرة عملية في ذات المجال لا تقل عن 5 سنوات.
Job Category
Strategic Planning
Advertiser
Economic Security Center of Dubai
Educational-level
Bachelor
Required Nationality
UAE Only
Monthly Salary
Unspecified
Schedule-Time
Full time
Job Posting
31/12/2024
Unposting Date
Ongoing
Seniority level- Entry level
- Full-time
- Finance and Sales
- Government Administration
This job posting is active. It is recommended to remove irrelevant sections and ensure clarity and focus on the job details.
#J-18808-LjbffrRisk Management Specialist
Posted today
Job Viewed
Job Description
Insurance is a vital aspect of any business, and an Insurance Coordinator plays a crucial role in ensuring that all insurance-related operations are carried out efficiently.
The ideal candidate will have strong knowledge of insurance policies, claims procedures, and risk management strategies. They should be able to analyze insurance policies and contracts to identify gaps in coverage and recommend improvements.
Key Responsibilities:
- Collaborate with insurance providers to obtain and maintain appropriate coverage
- Advise internal teams on insurance policies, coverage, and claims procedures
- Negotiate rates and ensure cost-effectiveness with insurance providers
- Manage insurance claims from start to finish
- Conduct risk assessments and make recommendations for risk management strategies
- Stay updated on changes in insurance regulations and laws
- Maintain accurate records of insurance policies, claims, and payments
- Assist in developing and implementing insurance-related policies and procedures
- Provide training and support on insurance matters
Required Skills and Qualifications:
- Bachelor's degree in Business Administration, Risk Management, or related field
- Minimum 3 years of experience in insurance coordination or similar role
- Strong knowledge of insurance policies, claims procedures, and risk management strategies
- Excellent communication and interpersonal skills
- Proven ability to analyze and review insurance policies and contracts
- Highly organized with strong attention to detail and ability to manage multiple tasks and deadlines
- Proficient in Microsoft Office and other relevant software programs
- Ability to work independently and as part of a team
Benefits:
Competitive salary package
Opportunities for growth and development
Supportive work environment
We value our employees and offer a supportive work environment where you can grow and develop your career.