Job Summary and Purpose: Drive a strong and robust Information Security Management System (ISMS) in the organization through threat/vulnerability detection, security scanning, penetration testing, security monitoring, vulnerability mitigations, threat mitigations, identifying IT/OT security risks and other related information security activities. Ensure adherence to the various information security standards, and standards and provide technical consultation on Information Security issues. Accountabilities: Key Accountabilities: Information Security Management: • Identify information security vulnerabilities and threats in the company IT/OT technology network and infrastructure using various techniques e.g., penetration testing and vulnerability assessment. • Collate information from the conducted assessments and recommend appropriate remedial steps. • Develop, review, improve, and update information security policies, procedures, guidelines, and other related documents. • Provide support to build the organization wide information security awareness and training programs. Contribute and provide content for awareness activities. • Monitor, evaluate and ensure the segregation of duties on all systems to mitigate the risk of unintentional and/or deliberate system misuse. • Ensure compliance with the applicable internal and international information security standards (e.g. NIA, ISO27001). • Monitor changes or updates in any applicable law, regulation or accreditation standards pertaining to Information Security, and ensure compliance as required. • Ensure appropriate administrative and technical safeguards are in place to protect information assets from internal and external threats. Coordinate physical safeguards for those assets in coordination with the General Services department. • Liaise and maintain contact with governmental authorities, regulatory bodies, security groups and industry forums in the field of Information Security. • Prepare security baselines and safeguard applications, operating systems, and infrastructure devices by adopting the latest standards. • Resolve information security issues and improve the Information Security performance by providing technical consultation in system development, acquisition, procurement, implementation, change management, operation/support and architectural and other ad-hoc projects. • Assist all organizational units in areas related to Information Security and follow the related processes to provide support. Accountabilities: • Work with the concerned parties on the Information Security incidents and vulnerability management processes from design to implementation and beyond. • Review technical information in the requirements statements, feasibility analysis, operating procedure manuals, and other documents produced in the process of system development. • Monitor and assess IT systems security, system audit trails/logs and the validity of system configurations whenever required. • Assist in vulnerability mitigation, e.g. through software/system patching through the IT department. • Assist in performing on-going security monitoring of information systems including assessing information security risk, conducting functional and gap analyses to determine the extent to which key business areas and infrastructure comply with statutory and regulatory requirements. • Evaluate and recommend new information security technologies and countermeasures against threats to information or privacy and develop security reports and dashboards. • Ensure identification, recording, reporting, and resolving any Information Security violations. • Support and assist the other activities linked with Enterprise Risk and Business Continuity Management such as Risk Assessments and Business Impact Analysis. • Support the development of the organization’s disaster recovery and business continuity plans for information security, and tests readiness.

Qualifications, Experience and Job Skills: Qualifications: • Bachelor's Degree in Computer Science or any other equivalent field. • Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH) and Certified ISO27001 Lead implementer are preferred. • Globally recognized credential certification is preferred in Information Security domain for example, CISM, ISO27001LA. Experience: • Minimum of 4 years of Information Security experience. • IT background is preferred. Job Specific Skills: • Ability to manage pressure, prioritize needs, requirements and positively interact with the company users and external parties. • Ability to trouble shoot and investigate information security incidents. • Knowledge of Information Security Management System (ISO 27001) and other Information Security framework (NIST). • Security related qualifications (e.g. CISSP, CISM, CEH, ISO 27001 LI/LA).

Post date: Today
Publisher: Gulf Talnet
Post date: Today
Publisher: Gulf Talnet