This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Perform security reviews, identify gaps in security architecture, and develop a security risk management plan
Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change
Plan and conduct security authorization reviews and assurance case development for new and existing installation of systems and networks to confirm that risk is within acceptable limits
Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials)
Verify and update security documentation reflecting the application/system security design features
Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations
Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers)
Participate in Risk Governance process to provide security risks, mitigations, and input on other technical risk
Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc
Assure successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with the organization's mission and goals
Ensure that security design and cybersecurity development activities are properly documented (providing a functional description of security implementation) and updated as necessary
Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs)
Ensure that all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals
Conduct interactive training exercises to create an effective learning environment
Develop new or enhance existing awareness and training materials that are appropriate for intended audiences
Requirements:
Bachelor’s degree in engineering, Computer Science, Cyber Security, or any related field from a reputable university
Preferably have one of the following certifications: CCNA Security, CompTIA Security +, CISA, ISA27001
Fluency in Arabic and English
Fresh graduates with cybersecurity related certificate to 1 year experience in information security
Ability to: Identify systemic security issues based on the analysis of vulnerability and configuration data
Answer questions in a clear and concise manner
Ask clarifying questions
Communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means
Design valid and reliable assessments
Apply critical reading/thinking skills
Evaluate information for reliability, validity, and relevance
Function in a collaborative environment, seeking continuous consultation with others
Interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives
Interpret and understand complex and rapidly evolving concepts
Monitor advancements in information privacy technologies to ensure organizational adaptation and compliance
Relate strategy, business, and technology in the context of organizational dynamics
Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
Knowledge of: Computer networking concepts and protocols, and network security methodologies
Risk management processes (e.g., methods for assessing and mitigating risk)
Laws, regulations, policies, and ethics as they relate to cybersecurity and privacy
Cybersecurity and privacy principles
Cyber threats and vulnerabilities
Specific operational impacts of cybersecurity lapses
Authentication, authorization, and access control methods
Applicable business processes and operations of bank
Cyber defense and vulnerability assessment tools and their capabilities
Cryptography and cryptographic key management concepts
Data backup and recovery
Database systems
Business continuity and disaster recovery continuity of operations plans
Organization's enterprise information security architecture
Organization's Local and Wide Area Network connections
Security Assessment and Authorization process
Cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data
Cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
Risk Management Framework (RMF) requirements
Current industry methods for evaluating, implementing, and disseminating IT security assessment, monitoring, detection, and remediation tools and procedures
Personally Identifiable Information (PII) data security standards
Payment Card Industry (PCI) data security standards
An organization's information classification program and procedures for information compromise
Controls related to the use, processing, storage, and transmission of data
Application Security Risks (e.g. Open Web Application Security Project Top 10 list)
Skills in: Applying confidentiality, integrity, and availability principles
Determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes
Discerning the protection needs (i.e., security controls) of information systems and networks
Recognizing and categorize types of vulnerabilities and associated attacks
Interfacing with customers
conducting reviews of systems
network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools
Integrating and applying policies that meet system security objectives
Assessing security controls based on cybersecurity principles and tenets. (e.g., CIS CSC, etc)
performing impact/risk assessments
Information prioritization as it relates to operations
Interpreting vulnerability scanner results to identify vulnerabilities
Managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results
Performing target system analysis
Preparing and presenting briefings
Preparing plans and related correspondence
Prioritizing target language material
Processing collected data for follow-on analysis
Providing analysis to aid writing phased after action reports
Reviewing and editing assessment products
Reviewing and editing plans
Tailoring analysis to the necessary levels (e.g., classification and organizational)
Target development in direct support of collection operations
Target network anomaly identification (e.g., intrusions, dataflow or processing, target implementation of new technologies)
Access information on current assets available, usage
Analyze strategic guidance for issues requiring clarification and/or additional guidance
Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)