Job Description & Role:
* Design, implement, and monitor security measures for the protection of the systems, networks and information. This includes after hours on-call support and handling technical problems escalated from Level 1
* Establish and construct security standards and best practices that an organization should follow.
* Implement security controls to protect an organization's infrastructure, computer system, and digital files.
* Organize and conduct scans and testing in order to identify vulnerabilities.
* Report results of scanning or testing and provide security recommendations for further system security enhancement directly to the management.
* Prepare and document standard operating procedures and protocols.
* Ensure that the organization is aware of security incidents as much as possible, as quickly as possible.
* Educate the workforce on information security standards, policies, and best practices.
* Conduct penetration testing by simulating an attack on the system to find exploitable weaknesses.
* Monitor networks and systems for security breaches, through the use of software that detect intrusions and abnormal system behavior.
* Respond to any security breaches or intrusions that may occur.
* Provide the necessary assistant and support for the organization and their customers.
* Plan design and implement IDC (Internet Data Centre) upgrades and evolution.
* Provide NOC team with adequate technical tools for monitoring and managing security systems and networks.
* Advanced problem troubleshooting/isolation
* Advanced problem resolution following written procedures.
* Create/initiate new procedures.
* Perform procedures maintenance and validation.
* Report creation, validation & distribution.
* Support sales organization for technical matters when required.
* Execute quality assurance and management.
* Implement Security projects (Firewalls, DNS, switch configurations, network operating systems configurations, etc.).
* Assist in reporting and documentation, tuning on the tools, introduction of new products/tools for the NOC
* Assist in other activities and projects as needed.
* Perform implementation and maintenance of network security.
* Perform customer projects reporting.
* Manage technical escalations.
Key Skills:
* CCIE
* DNS
* Firewalls
* Networking
* Network Security
* Managed Services
* security system
* WAF
* SIEM
Additional Requirements:
* 4 -6 years of experience in networking & security (Switches, Routers, Firewalls, SIEM, Sandboxing, WAF, etc).
* Excellent knowledge and hands-on experience in configuring, supporting, and managing high-end infrastructure security, SIEM solutions, WAF and Firewalls, DNS Security, VA/PT, DDoS prevention solutions.
* CCIE Security, NSE4 is a plus.
* Experience in planning, designing, implementing, and managing security, networks, and Platforms.
* Systematic and process oriented.
* Good troubleshooting, project management, communication, and presentation skills
* Experience with Firewalls (functionality and maintenance), Office 365 Security, Endpoint Security, Sandboxing, SIEM, DNS security, DLP, and related technologies.
* Solid background in Network and Network Security
* Proper vulnerability management.
* Excellent command of English.
**Role Summary** At EY, you 'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better, too. Join us and buil…
**Categories** **:** Technology **Salary** **:** Negotiable **Job Information** **:** job description IT Security Specialist Are you highly innovative and transformative leader with strong understanding of complex technology environments? Have experience in Information Security domain for at …
We are looking for a talented and skilled IT Security Specialist to join our multicultural and diverse team in Kuwait. You will be responsible for providing the vision and strategies necessary to ensure the confidentiality, integrity, and availability of electronic information by communicating risk…
**Position** SECURITY SPECIALIST **Req Code** 3130-002 **Location** KHASHM AL AN **Grade** S-26 **Basic Functions** Assists in administration of the overall physical security and safety program. Liaises with MNG on behalf of the security coordinator in his absence. Develops and recommen…
## **Duties** * Implement and administer Regional Cyber center (RCC) personnel security, information security, sensitive compartment information, TEMPEST, foreign disclosure, industrial security and physical security programs. * Serves as the Special Security Officer (SSO) for the RCC Sensitive…
Company Description We will give you the flexibility you need to do your best work with hybrid work options. Whether you’re working from an AECOM office, remote location or at a client site, you will be working in a dynamic environment where your integrity, entrepreneurial spirit and pioneerin…
Company Description We will give you the flexibility you need to do your best work with hybrid work options. Whether you’re working from an AECOM office, remote location or at a client site, you will be working in a dynamic environment where your integrity, entrepreneurial spirit and pioneerin…
**Introduction** At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to attempt things you've never thought possible. Are you ready to lea…
We are looking for the right people -- people who want to innovate, achieve, grow and lead. We attract and retain the best talent by investing in our employees and empowering them to develop themselves and their careers. Experience the challenges, rewards and opportunity of working for one of the w…
**Job Responsibilities:** * Control & Review Audits/assessments; management of incident prevention, detection and incident response and ensure ongoing maintenance of security. * Risk Assessment Develop and implement an ongoing risk assessment program targeting information security. Recommend me…