Design, install, configure, monitoring and maintenance of Server virtualization Infrastructure and architecture.
Build, configure, and deploy VMs and templates.
Fine tune VMs configurations to get the best performance/resource consumption.
Detection of Virtual machine issues, monitoring and ownership of standards and requirements.
Manage ESXi and VM patch update.
Regularly check capacity for the infrastructure and plan tasks for the team.
Document the process and procedures.
Responsible to setup new hardware to support virtualized infrastructure.
Maintain accurate and up to date inventory & documentation.
Troubleshoot the complex issues and document incident resolution for all related incidents.
Administer accounts, network rights, and access to OT/ICS Cybersecurity systems and equipment.
Maintain baseline system security for OT/ICS Cybersecurity Systems and supported infrastructure according to organizational policies and operational standards. Assist and support OT/ICS systems custodians to apply the baseline system security.
Visiting Sites to perform the related Cybersecurity Activities
Resources- minimum qualifications required:
Bachelors degree in information security, Computer Science, Electronics / Instrumentation Engineering or similar discipline/related field.
More than 10 years of experience in information security and ISMS/CSMS development and implementation with at least 5 years of experience in IT/OT Cybersecurity consultancy/Operation preferably in the oil and gas domain
Strong analytical and problem-solving skills.
Has worked on enterprise-wide projects within organizations with similar project scopes.
Excellent written and verbal communication skills in English
Ability to work independently and as part of a team.
Experience with security frameworks and standards (e.g., UAE IAS, ISA 62443, NIST, Shell DEP, ITIL etc.)
Professional security certifications such as GICSP, CISSP, CISM,CISA, ISA 62443 fundamentals or ISO 27001 Lead Implementer/Lead Auditor.
Content development and Fine tuning of use cases/correlation rules based on the relevant attacks and threat landscape of the OT network and Organization.