Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Feb 21, 2018
    Deadline: Mar 25, 2018
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    Looking for custom Mobile, Cloud, Security, Big Data, Database, IT Staff Augmentation or Digital Marketing solutions & services? Look no further... You have arrived at the right Destination. Cloud Computing is poised to redefine and take over the IT world and change the way companies around the world do business. Cloud computing has the potential to bec...
    Read more about this company

     

    Information Security Officer for UAE

    Responsibilities
    Information Security Program Implementation:

    • Extensive knowledge and hands on experience on FortiGate UTM, Forti Analyzer, Kaspersky enterprise antivirus, Trend Micro OfficeScan Suite, Cisco Firewall Threat Defense, SIEM, DLP, Mimecast and Cisco ISE (Identity Service Engine)
    • Very good technical expertise in managing multivendor firewalls, security infrastructure devices, VPNs and other security products throughout the organization.
    • Daily duties will include reviewing malicious email and files, extracting Indicators of Compromise, and using the resulting data to create rules to block and detect similar activity in the future.
    • Strong Knowledge of security concepts, latest threats and vulnerabilities. Network security Infrastructure design and implementation experience.
    • Use incident, event, problem, configuration, change and release management practices to report, track, implement solutions, and resolve security related issues.
    • Create, update and maintain Anti-Virus design, architecture, data profiles, licenses, support agreements and standard operating procedures.
    • Investigates, analyzes, and responds to cyber incidents within the network environment or enclave and perform basic incident analysis.
    • Help analyze and shore up any possible vulnerability; and must also be aware of any unusual activity and react swiftly to prevent or mitigate breaches.
    • Implement stability and security procedures regarding malware in the company's information assets; this can include installation, upgrading, and improvement of malware detection and prevention software across the entire company, as well as implementing policies for firewalls and site-blocking.
    • Provision Cisco routers & switches on need basis
    • Troubleshoot BGP/MPS/ or any routing switching problem

    Educational Qualifications

    • B.Sc in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent).

    Skill set required:

    • Minimum 5 years’ experience working directly in an Information Security or Information Technology department with experience performing malware analysis, incident response, reviewing security product logs and identifying anomalies, system audit and monitoring, incident response.

    Other Requirements:

    • Fluent in English
    • Strong interpersonal, communication (verbal and written).
    • Familiarity with Windows OS and network vulnerabilities, server and database.
    • Knowledge of Cybersecurity and Counterintelligence environments and new and evolving requirements as they relate to the Insider Threat program.
    • Extensive knowledge and hands on experience on FortiGate UTM, Forti Analyzer, Kaspersky enterprise antivirus, Trend Micro OfficeScan Suite, Cisco Firewall Threat Defense, SIEM, DLP, Mimecast and Cisco ISE (Identity Service Engine)
    • Knowledge of operating systems, including Windows, Linux, and Mac, application behaviors, and network traffic analysis to identify malware exploits.
    • Ability to work independently with little direction and/or supervision.
    • Ability to prioritize and multitask and a work approach that supports flexibility and adaptability is paramount.
    • Must have a clear understanding of the challenges of information security.
    • Strong process orientation with significant attention to details and ability to resolve conflicts and complex issues.
    • Problem solving abilities including self-confidence to ensure issues are escalated appropriately.

    Terms and Conditions

    • Joining time frame: Immediate (15 - 30 days)
    • The selected candidates shall join VAM Systems - UAE and shall be deputed to one of the leading Organizations in UAE.

    Method of Application

    Applicants should send their latest Resume in MS Word format to: ambili.krishnan@vamsystems.com

     

    Build your CV for free. Download in different templates.

  • Apply Now
  • Send your application

    View All Vacancies at VAM Systems Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail