عربي
Search Search Search

 

CSR

 

Fuel Prices

 

Tenders

 

  • Products and Services
  • Fuel Prices
  • Tenders
Call Center
40217777
Toll Free Number
800-3835 800-FUEL

Job Application

​​​​​​​​​​​​​​​​​​​​​​​​​​​​

 

 

IT Security Operation (Supervisor)Information Technologyتكنولوجيا المعلوماتIT Security Operation (Supervisor)IT Security Operation (Supervisor)5/30/2020 9:00:00 PM<p><span class="ms-rteThemeForeColor-2-5 ms-rteFontSize-2" style="font-family:arial;"><strong>Qualifications:</strong></span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;"><span style="font-size:10pt;">Bachelor's degree in Computer Engineering or IT field</span></span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;"><span style="font-size:10pt;"></span><span class="ms-rteFontSize-2" style="font-family:arial;"><strong>Experience:</strong></span></span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">10+ years of experience in IT Security including mandatory 5+ years of relevant experience in IT Security</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">5+ years combined experience with application, database, network and perimeter security, SIEM, incident response; hands on experience with SIEM, DPI, GRC, Antivirus, Intrusion Detection Systems, HIPS, Web Proxy/Content Filtering, Active Directory, PKI, Radius, MFA solutions</span></p><p><strong class="ms-rteThemeForeColor-2-5 ms-rteFontSize-2" style="font-family:arial;">Skills:</strong></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Networking Skills - Strong experience in Windows and *nix environments. Excellent understanding of TCP/IP and network communications. Strong network administration skills. Packet-level behavioural familiarity with most major TCP/IP application protocols (DNS, SMTP, HTTP, BGP, LDAP, IMAP, SSH, FTP, KRB5, DHCP, CIFS). General understanding of key components of internet architecture.</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Incident Handling - Excellent computer security incident handling, analytical and communication skills. Familiarity with interpreting the log output of a wide selection of device classes including networking and host Infrastructure devices. In depth knowledge of computer security forensics and security vulnerabilities. Broad knowledge of business-impacting security scenarios and viable methods to detect these scenarios (Cross device log correlation)</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Operating Systems - Strong systems administration skills. Conceptual knowledge of operating system internals (file handles, threads, semaphores, stack, heap, entry points). Implementation experience with general enterprise core service types (web/mail/dns/file servers)</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Security Tools & Technologies - Well versed and 5+ years hands on in multiple security technologies such as SIEM, DPI, GRC, Antivirus, Intrusion Detection Systems, HIPS, Web Proxy/Content Filtering, Active Directory, PKI, Radius, MFA solutions </span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Deep knowledge of OWASP Top 10, CWE/SANS Top 25, WASC</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Understanding of log analysis and security forensics </span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Professional certifications in information security such as CISSP preferred</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Product certification from vendors like, Microsoft, PaloAlto, Fortinet, F5, Carbon Black etc are desirable</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Innovative and conceptual thinking, Analytical, Communication </span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Team Management, Project Management, Planning and organising, Change management </span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Effective coaching and mentoring </span></p><p><span class="ms-rteThemeForeColor-2-5">​<span class="ms-rteFontSize-2 ms-rteThemeForeColor-2-5" style="font-family:arial;"><strong>Qualifications:</strong></span></span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;"><span style="font-size:10pt;">Bachelor's degree in Computer Engineering or IT field</span></span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;"><span style="font-size:10pt;"></span><span class="ms-rteFontSize-2 ms-rteThemeForeColor-2-5" style="font-family:arial;"><strong>Experience:</strong></span></span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">10+ years of experience in IT Security including mandatory 5+ years of relevant experience in IT Security</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">5+ years combined experience with application, database, network and perimeter security, SIEM, incident response; hands on experience with SIEM, DPI, GRC, Antivirus, Intrusion Detection Systems, HIPS, Web Proxy/Content Filtering, Active Directory, PKI, Radius, MFA solutions</span></p><p><strong class="ms-rteFontSize-2 ms-rteThemeForeColor-2-5" style="font-family:arial;">Skills:</strong></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Networking Skills - Strong experience in Windows and *nix environments. Excellent understanding of TCP/IP and network communications. Strong network administration skills. Packet-level behavioural familiarity with most major TCP/IP application protocols (DNS, SMTP, HTTP, BGP, LDAP, IMAP, SSH, FTP, KRB5, DHCP, CIFS). General understanding of key components of internet architecture.</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Incident Handling - Excellent computer security incident handling, analytical and communication skills. Familiarity with interpreting the log output of a wide selection of device classes including networking and host Infrastructure devices. In depth knowledge of computer security forensics and security vulnerabilities. Broad knowledge of business-impacting security scenarios and viable methods to detect these scenarios (Cross device log correlation)</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Operating Systems - Strong systems administration skills. Conceptual knowledge of operating system internals (file handles, threads, semaphores, stack, heap, entry points). Implementation experience with general enterprise core service types (web/mail/dns/file servers)</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Security Tools & Technologies - Well versed and 5+ years hands on in multiple security technologies such as SIEM, DPI, GRC, Antivirus, Intrusion Detection Systems, HIPS, Web Proxy/Content Filtering, Active Directory, PKI, Radius, MFA solutions </span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Deep knowledge of OWASP Top 10, CWE/SANS Top 25, WASC</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Understanding of log analysis and security forensics </span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Professional certifications in information security such as CISSP preferred</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Product certification from vendors like, Microsoft, PaloAlto, Fortinet, F5, Carbon Black etc are desirable</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Innovative and conceptual thinking, Analytical, Communication </span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Team Management, Project Management, Planning and organising, Change management </span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Effective coaching and mentoring </span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-size:10.5pt;">​<span lang="EN-GB" style="line-height:107%;font-family:arial;"><strong>JOB OBJECTIVE:</strong></span></span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Assisting head of IT Security in performing the information security management functions. </span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Lead a team of IT Security Engineers providing around-the-clock protection and cyber defence of WOQOD's global network of applications and data from threats from cyberspace </span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10.5pt;"><span lang="EN-GB" style="line-height:107%;"><strong>Description</strong></span></span></p><p style="text-align:justify;"><strong class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10.5pt;">Supervision of Subordinates </strong></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Organise and supervise the activities and work of subordinates (IT Security analysts) to ensure that all work within a specific area of the activity is carried out in an efficient manner which is consistent with operating procedures and policy. Provide on-the-job training and constructive feedback to subordinates to support their overall development.</span></p><p style="text-align:justify;"><strong class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10.5pt;">Budgets and Plans</strong></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Contribute to the preparation of the budget and monitor financial performance versus the budget so that the business is aware of anticipated costs/revenues and areas of unsatisfactory performance are identified.</span></p><p style="text-align:justify;"><strong class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10.5pt;">Scope of Work</strong></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Lead the IT Security function for the business, managing the IT Security Engineers and ensuring their work and output aligns to the organisational priorates.</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Collaborate with other Security Engineers, Incident Response Analysts, and the Head of IT Security to develop detection logic, implement automation and machine learning, and improve processes</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Participate in information security operations duties, including occasional incident response escalations.</span></p><p style="text-align:justify;"><strong class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10.5pt;">Inspection of Security Breaches</strong></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Review violations of systems security procedures and discuss procedures with violators to ensure violations are not repeated; escalate the case in case of a high-level security breach or violation to the IT Cyber Security Head so that proper action can be taken.</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10.5pt;"><strong>Network, Systems & Infrastructure security</strong></span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Develop, maintain and enhance enterprise security architecture. Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement Responsible for configuring, setting up and maintaining perimeter defence systems including Perimeter Nextgen Firewall, Email security Gateway, IPS systems, Remote access VPN, WAF</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Maintains a thorough understanding of the security infrastructure in WOQOD and the basics behind the Internet and its workings (DNS, LAN, Security, IP Routing, HTTP, VPN, Email Routing, SPAM, etc.)</span></p><p><span style="font-size:10.5pt;">​<span lang="EN-GB" style="line-height:107%;font-family:arial;"><strong>JOB OBJECTIVE:</strong></span></span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Assisting head of IT Security in performing the information security management functions. </span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Lead a team of IT Security Engineers providing around-the-clock protection and cyber defence of WOQOD's global network of applications and data from threats from cyberspace </span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10.5pt;"><span lang="EN-GB" style="line-height:107%;"><strong>Description</strong></span></span></p><p style="text-align:justify;"><strong class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10.5pt;">Supervision of Subordinates </strong></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Organise and supervise the activities and work of subordinates (IT Security analysts) to ensure that all work within a specific area of the activity is carried out in an efficient manner which is consistent with operating procedures and policy. Provide on-the-job training and constructive feedback to subordinates to support their overall development.</span></p><p style="text-align:justify;"><strong class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10.5pt;">Budgets and Plans</strong></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Contribute to the preparation of the budget and monitor financial performance versus the budget so that the business is aware of anticipated costs/revenues and areas of unsatisfactory performance are identified.</span></p><p style="text-align:justify;"><strong class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10.5pt;">Scope of Work</strong></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Lead the IT Security function for the business, managing the IT Security Engineers and ensuring their work and output aligns to the organisational priorates.</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Collaborate with other Security Engineers, Incident Response Analysts, and the Head of IT Security to develop detection logic, implement automation and machine learning, and improve processes</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Participate in information security operations duties, including occasional incident response escalations.</span></p><p style="text-align:justify;"><strong class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10.5pt;">Inspection of Security Breaches</strong></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Review violations of systems security procedures and discuss procedures with violators to ensure violations are not repeated; escalate the case in case of a high-level security breach or violation to the IT Cyber Security Head so that proper action can be taken.</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10.5pt;"><strong>Network, Systems & Infrastructure security</strong></span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Develop, maintain and enhance enterprise security architecture. Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement Responsible for configuring, setting up and maintaining perimeter defence systems including Perimeter Nextgen Firewall, Email security Gateway, IPS systems, Remote access VPN, WAF</span></p><p><span class="ms-rteThemeForeColor-2-5" style="font-family:arial;font-size:10pt;">Maintains a thorough understanding of the security infrastructure in WOQOD and the basics behind the Internet and its workings (DNS, LAN, Security, IP Routing, HTTP, VPN, Email Routing, SPAM, etc.)</span></p>

Back to Vacancies Page >> ​​​​​​​​​​​

This job has been closed.

 

x
Refine