Job Objective:Manage the implementation of IT software, hardware and data security tasks in accordance with the IT security strategy, procedures and standards, in accordance with standards and policies of ADM and the regulations of the UAE.Job responsibilities:
Responsible for day-to-day operations related to IT security.
Contribute to the study and analysis of the latest IT security methodologies, tools and standards to keep pace and apply the best practices of IT security systems.
Application of IT security measures to software, hardware, data and system management in accordance with applicable policies and laws in a manner consistent with the foundations of IT security and close cooperation with regulations.
Monitor the current IT security system and operational environment, implement effective systems and hardware solutions, vulnerability to risk, impact of potential threats and systems availability.
Contribute to the development of policies and procedures related to IT security and ensure that ADMs policies and procedures are adapted.
Implement an IT security strategy to protect IT systems, prevent potential threats and report on them.
Apply appropriate IT security standards and standards, policies and processes.
Identify and assess potential threats to the IT system, data, infrastructure, etc.
Manage the security aspects of information technology technically and operationally and deal with security threats and ensure a quick recovery of disaster recovery) datain accordance with procedures, processes, guidelines and reporting of any security incidents.
Take precautions and steps to protect networks and devices from viruses and people who are not authorized to do so.
Education & Skills:
Bachelors in information technology
Certifications like Certified Etihical Hacker(CEH), CISM, Cloud security.
4 years of experience in similar position.
Knowledge of concepts PCI, ISO standards, OWASP, GDPR, COBIT, Secure SDLC, DevSecOps, Cloud Security, Cisco Security Management, ISACA CISA, Security Access, Computer Information Security, Web Proxy, Firewall, IP Telephone Security, Email Proxy.