عربي

الصفحة الرئيسية وظائف في الامارات وظائف في أبوظبي وظائف رائده في أبو ظبي قيادة

Cybersecurity Expert - ASM Lead

Injazat Information Technology

يعين في أغسطس-أب 8, 2019

8 - 10 سنوات أبو ظبي - الامارات العربيه المتحدة

بكالوريوس في التكنولوجيا / الهندسة (أجهزة الكمبيوتر). أي جنسية

عدد الشواغر01

الوصف الوظيفي

ايميل الوظيفة
تم إرسال البريد الإلكتروني بنجاح.

Lead the
threat management, vulnerability management and CTI operations and reporting
processes, to ensure that client threats, and vulnerabilities are being
addressed effectively & efficiently and Looking after the day to day
activities of proactive threat research and investigate attack activity or
artifact from diverse data and operational environments.
Cyber
Vulnerability Assessment and Penetration Testing Domain:
• Manage
the day-to-day needs of the team and operations for vulnerability management
and attack surface reduction
• Provide
threat analysis summations to leadership along with propose actions to minimize
threats
• Develop
close working partnerships with functional senior leaders to ensure
Vulnerability analysts have the support, products, and permissions they need to
accomplish their mission
• Provide
quality control over team products; assist with drafting, editing, critiquing,
and proofreading vulnerability management playbooks, policies, and reports
• Maintain
an ongoing development of current threat intelligence and vulnerability
analysis with an in-depth knowledge of identification, mitigation, and recovery
strategies
• Oversee
the delivery of effective vulnerability scanning of infrastructure, code, and
applications within both corporate and Cloud environments
• Guide
and direct staff in the successful completion and recording of scanning
activities, as required by audit and regulatory authorities
• Provide
direction and guidance how to manage the consolidation of large sets of data
specific to vulnerabilities to apply accurate risk weighting and prioritization


سوفت وير تقنية المعلومات

ملخص المرشح المطلوب

• Bachelor s Degree in Computer Engineering, Computer Science
or a relevant field.
• 8-10 years experience in SOC operations and threat
management
• Expertise in cyber threat intelligence &
analysis platforms, TI tools, & related technologies
• Strong leadership & communication skills.
• Strong experience using scripting language (Python,
Ruby, Shell, Perl; prefer Python
• Excellent analytical skills
• Holds active CISSP certification.
• Other Information
security and/or Information Technology industry certification (CISA, CISM, GIAC
or equivalent) are a plus
The
Specific Skills of Vulnerability Assessment and Penetration Testing (VAPT) :
• Experience with leading a
team responsible for performing compliance scans, analysing configurations, as
well as recommending hardening configuration settings for networks, operating
systems, applications, databases, and other information system components
• Detailed knowledge of
TCP/IP communications, common protocols, and applications at the network level
• Demonstrated analytic
expertise to include ability to think critically and logically in a dynamic,
high-pressure, fast-paced environment
• Excellent oral and written
communication skills
• Experience with Penetration
testing and VA tools
• Experience with Microsoft,
OS X, and Unix-based operating systems
• Experience supporting
network investigations
• Experience in scripting
with Perl, Shell, Python, or similar high-level programming language
• MBA or graduate degree from
an accredited institution
• Experience leading a
security team in an enterprise environment
• Experience working with
platform owners to resolve vulnerability and configuration issues
• Experience managing and
tracking vulnerability cases
• Experience with enterprise
full packet capture solutions
• Network or Engineering
Certification, including Network , MCSE, or CCNA
• Preferred certifications
include, Security , CEH, GCIA, GCIH, CISSP or similar certification
• Perform scans to identify
vulnerabilities or confirm compliance to security standards
• Maintain patch and
vulnerability management practices to protect against the exploitation of
critical vulnerabilities
• Apply knowledge of
operating systems, applications, and database vulnerability assessments (to
include system configuration checks) on various Information Systems
• Interpret vulnerability
assessment results and report findings to senior VM staff as well as
recommendations for remediation
• Conduct research on current
vulnerabilities and exploits using publicly available, trusted resources and
other finished vulnerability products
• Implement and utilize a
combination of automated tools (e.g., Nessus, Tanium) and manual checks to
identify and validate vulnerabilities
• Identify cybersecurity
vulnerabilities through social engineering, penetration testing and
vulnerability assessments of digital devices, networks, systems, and
applications
• Evaluate cybersecurity
vulnerabilities in applications, network devices, and infrastructure software
• Evaluate cybersecurity
vulnerabilities in physical devices, and mobile devices analysis to highlight
compromise

الكلمات الرئيسية

نظام تشغيل حواسيب بيرل الثعبان مايكروسوفت شهادة سيسكو أمن المعلومات شهادة هندسة نظم الكمبيوتر شركه نفط الجنوب ياقوت تقنية المعلومات

سهل التطبيق

ابلاغ عن هذه الوظيفة

تنبيه:نوكري غلف فقط منصّة يجمع بين كل من الباحثين عن عمل و أصحاب العمل. ننصح المتقدمين للوظائف التحقق من شرعية أصحاب العمل المحتملين. نحن لا ندعم أي مطالبات لتحويل الأموال و ننصح بشدة ضد الإفصاح عن اي معلومات شخصية أو مالية.و ننصح أيضا زيارةتحذير أمنيللمزيد من المعلومات. إذا تشك في أي غش أو احتيال اتصل بنا علىabuse@naukrigulf.com

Injazat Information Technology


عرض تفاصيل الاتصال

الاتصال

الاسم / التعيين:
-

موقع الكتروني https://injazat.taleo.net/careersection/injazat-external/jobdetail.ftl?job=10329&lang=en


معلومات إضافية مطلوبة

طلب صاحب العمل بعض المعلومات الإضافية مع طلبك للحصول على هذه الوظيفة

تسجيل الدخول الى نوكري غلف

مواصلة استخدام

ستبقى جميع أنشطتك سرية

أو