Cyber Security Anti Hacker Lead – Ethical Hacking/Information Security
  • United Arab Emirates Dubai
  • Miamin Systems Inc
1 year before
31.12.2023
Oversee and Govern
Cybersecurity Management
Job Description

Key Responsibilities:
Job Description :
– We are hiring a Cyber Security Lead to ensure our systems and software is completely hacker proof internally. You will monitor our computer networks for security issues, install security software, and document any security issues or breaches you find.
– To do well in this role you should have a bachelor’s degree in computer science and experience in the information security field. You must be working with a Tech Start Up and be responsible for ensuring the IT Systems are hack proof.
Responsibilities :
– Monitor computer networks for security issues.
– Investigate security breaches and other cyber security incidents.
– Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.
– Document security breaches and assess the damage they cause.
– Work with security team to perform tests and uncover network vulnerabilities.
– Fix detected vulnerabilities to maintain a high-security standard.
– Stay current on IT security trends and news.
– Develop company-wide best practices for IT security.
– Perform penetration testing.
– Help colleagues install security software and understand information security management.
– Research security enhancements and make recommendations to management.
– Stay up-to-date on information technology trends and security standards.
To fit the bill :
– You have to be a Certified Ethical Hacker
– Bachelor’s degree in computer science or related field.
– Experience in information security or related field.
– Experience with computer network penetration testing and techniques.
– Understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts.
– Ability to identify and mitigate network vulnerabilities and explain how to avoid them.


Quick response

Required Knowledge
  • K0001   Knowledge of computer networking concepts and protocols, and network security methodologies.
  • K0002   Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • K0003   Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • K0004   Knowledge of cybersecurity and privacy principles.
  • K0005   Knowledge of cyber threats an`d vulnerabilities.
  • K0038   Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.
  • K0043   Knowledge of industry-standard and organizationally accepted analysis principles and methods.
  • K0046   Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
  • K0090   Knowledge of system life cycle management principles, including software security and usability.
  • K0149   Knowledge of organization's risk tolerance and/or risk management approach.

Required Skills
  • S0027   Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.

Required Abilities
  • A0128  Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
  • A0170  Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
  • A0165  Ability to manage Communications Security (COMSEC) material accounting, control and use procedure.