Chief Information Security Officer
Taajeer Finance
مجموع سنوات الخبرة :11 years, 0 أشهر
Developing and maintaining:
o Cybersecurity strategy.
o Cybersecurity Policies and Procedures.
o Cybersecurity architecture.
o Cybersecurity risk management process/methodology.
o Cybersecurity Awareness Programs and Campaigns..
• Providing risk-based Cybersecurity solutions and recommendations that address people, process, and technology on the orgnaizsion .
• Initiate security operation center (SOC) and build, manage, and enhance SOC rules.
• Ensure and maintain monitoring of the Cybersecurity activities (SOC monitoring) through red teaming activities.
• Overseeing the investigation of Cybersecurity incidents and initiate appropriate actions for Cybersecurity incidents and violations then to wrap it up with lessons learned documentations.
• Gathering and analyzing threat intelligence from internal and external sources.
• Performing Cybersecurity reviews.
• Regularly conducting Cybersecurity risk assessments on information assets.
• Proactively supporting other functions on Cybersecurity, including:
o Performing information and system classifications.
o Determining Cybersecurity requirements for important projects.
o Performing Cybersecurity reviews.
o Conducting security threats checks on the organization assets and systems.
• Brand Protection and Monitoring administrator.
• Migration of E-mails into MSSP with evaluationg the security mail getway rules and setup.
• Developing skills and experience of Cybersecurity staff to deliver Cybersecurity solutions in a business context.
• VAPT reports evaluation and suggestions on remediation process.
• Security Controls and IT evaluation.
• Performed threat analysis in a 24/7 environment, mitigating and managing all threat and risks to the company.
• Analyzing and identify potential threats to fine tune the existing security monitoring platforms.
• Assist in the enhancement of delivery and management of key technology security platforms including SIEM and DLP.
• Develop specific content necessary to implement Security Use Cases and transform into correlation queries, templates, reports, rules, alerts, dashboards, and workflow.
• Assist with real-time security incident handling and tracking (e.g., intrusion correlation/tracking, threat analysis, and direct system remediation) tasks to support Incident Response Team.
• SIEM use cases incidents from inception, through to tuning.
• Leading and managing the Security Operations and team of security operational staff members.
• Dealing with End point security.
• Create, maintain, and review security policies and controls across the business and the need.
• Support the technical implementation of ongoing security requirements, including access control and technical audits.
• Conduct testing of security controls to identify and close gaps.
• Leading network and application security personnel, developing strategy, setting goals, and providing performance and professional development feedback.
• Provide oversight and guidance during security incidents and investigations, ensure root cause analysis is undertaken and input suggested approaches to deal with lessons identified.
• Monitors security events from the various SOC entry channels \[SIEM solutions, Ticketing system, and multiple of Email Protection Solutions\], based on the security event severity, escalate to IR team for any incident accrued after investigation on the case.
• Analyzing security breaches to identify the root causes.
• Provide Incident Response (IR) support when analysis confirms actionable incident.
• Provide threat and vulnerability analysis as well as security advisory services.
• Dealing with End point security tasks.
• Recommend enhancements to SOC security process, procedures, and policies.
• Manage application projects life cycle through analysis design. Develop, Install, Configure, and Test.
• Communicate with vendors and other IT personnel for problem resolutions.
• Trainer for new systems and applications and prepare manuals for both technical and users.
• Products Manger to collect the required features from end user and finalize these requirements.
• Manage and monitor installed applications.
• Coordinate and perform tests, including end user reviews for any modified or new systems.
• Monitor and test systems performance.
• Act as a single point of contact for phone calls and emails from staff regarding IT issues and queries.
• Receiving, logging, and managing calls from internal staff via telephone and email.
• 1st and 2nd line support - troubleshooting of IT related problems from in-house software to hardware, such as PCs, Laptops, Scanners and Printers.
• Basic Active Directory knowledge. Creating user accounts, reset passwords, create groups etc.
• Install new PCs, Applications, and Devices as per user or management requests.
لقد تم حذف الرابط بسبب انتهاكه لسياسة الموقع. يرجى التواصل مع قسم الدعم لمزيد من المعلومات.