Cyber Security Manager
  • United Arab Emirates Dubai
  • eMagine Solutions
1 year before
31.12.2023
Oversee and Govern
Cybersecurity Management
Job Description

The Role
Cyber Security Manager / Permanent / Dubai A leading client in the financial sector are seeking to bring on a Cyber Security Consultant to be responsible for the overview of the Cyber Security structure. You will be responsible for identifying problems, evaluating security issues, assessing risk, and implementing solutions to address threats. Role: Cyber Security Manager Location: Dubai Duration: Permanent

Requirements
To be considered for this role it is essential to have the below experience: • Establishing the best way to defend devices, networks, software, data, and complete information systems against possible intrusion and cyber-attacks • Perform vulnerability testing much like a white hat hacker does, including risk analyses and security assessments • Plan, research, and design an all-encompassing, capable security architecture for IT project • Provide professional supervision for, and guidance to, the in-house security team • Define, implement, and maintain a fitting corporate security policy for the client’s organization • React and respond immediately to any security-related incidents, and then provide a thorough post-event analysis • Follow up with the client by updating and upgrading their security systems as needed Do your skillsets meet the requirements for this role? Interested? Please apply now online. N.B: only candidates who are shortlisted for this role will be contacted

About the company
eMagine Solutions is one of the leading authorities on leadership and talent globally. Our combined resources of over 100 years professional experience mean that our clients trust us with finding them the top talent globally and candidates trust us to find them the right opportunity in a timely and confidential manner. Throughout our offices we provide complete solutions for our clients, including traditional temporary and permanent recruitment, executive search, recruitment process outsourcing (RPO), salary survey's, market mapping and training and development courses. Our global client list work with us not only because of our expertise but also because of our honesty, integrity and passion.


Quick response

Required Knowledge
  • K0001   Knowledge of computer networking concepts and protocols, and network security methodologies.
  • K0002   Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • K0003   Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • K0004   Knowledge of cybersecurity and privacy principles.
  • K0005   Knowledge of cyber threats an`d vulnerabilities.
  • K0008   Knowledge of applicable business processes and operations of customer organizations.
  • K0021   Knowledge of data backup and recovery.
  • K0026   Knowledge of business continuity and disaster recovery continuity of operations plans.
  • K0033   Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).
  • K0040   Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
  • K0042   Knowledge of incident response and handling methodologies.
  • K0043   Knowledge of industry-standard and organizationally accepted analysis principles and methods.
  • K0046   Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
  • K0058   Knowledge of network traffic analysis methods.
  • K0059   Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
  • K0070   Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • K0087   Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.
  • K0090   Knowledge of system life cycle management principles, including software security and usability.
  • K0106   Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities.
  • K0151   Knowledge of current and emerging threats/threat vectors.

Required Skills
  • S0018   Skill in creating policies that reflect system security objectives.
  • S0027   Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
  • S0059   Skill in using Virtual Private Network (VPN) devices and encryption.
  • S0138   Skill in using Public-Key Infrastructure (PKI) encryption and digital signature capabilities into applications (e.g., S/MIME email, SSL traffic).

Required Abilities
  • A0128  Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
  • A0161  Ability to integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robust software quality control process; and establishing multiple sources (e.g., delivery routes, for critical system elements).