cyber security engineer
Arab Bank
Total years of experience :2 years, 11 Months
Participate in market research, evaluation, and testing of latest Cybersecurity Technologies.
Participate in managing Cybersecurity management solutions to enable centralized Inventory Management, Configuration Management, Control Compliance Management, Security, Patch Management, Performance Tuning, and Health Monitoring.
Participate in managing enterprise technologies to fulfill the digital transformation requirements, and business units expansion requirements including: Network Firewalls, TACAS, Intrusion Detection System, Intrusion Prevention Systems, Web Content Filtering, Web Application Firewalls, Application Security Managers, Application Policy Managers, Reverse Proxies, Threat Intelligence, Deceptive Threat Intelligence, Brand Protection, Public DNS, Internet Security Solutions, Cyber defense solutions, DDOS Protection, Multi-Factor Authentication, Remote Access, VPN, Privilege Access Management, Identity and Access Management, Self-Service Password Management, Email Journaling, Mobile Device Management, Anti-Spam, Email Security / Filtering/ and Sandboxing, Email Encryption, Endpoint Encryption, Public Key Infrastructure, Encryption Certificate Lifecycle Management, Centralized Encryption Key Management, Patch Management, Endpoint Protection, Endpoint Firewalls, Host-Based Intrusion Prevention System, Application Control, File Integrity Monitoring, Endpoint Detection and Response, Data Leakage Prevention, Change Auditing and Reporting, Session Recording.
Provide technical support, problem resolution, and follow up with vendors on support tickets.
Adhere to Cybersecurity solutions Policies, Procedures, Guidelines, and Standards according to industry best practices and inline with regulatory compliance requirements.
Address emerging hardening, vulnerability management, penetration testing, information security, and compliance requirements for Cybersecurity.
•Identifying hardware and software solutions.
• Troubleshooting technical issues.
• Diagnosing and repairing faults.
• Resolving network issues.
• Installing and configuring hardware and software.
• Talking customers through a series of actions to resolve a problem..
• Replacing or repairing the necessary parts.
• Supporting the roll-out of new applications..
• Testing and evaluating new technologies.
organizing and leading assigned student workshops. Describing workshop concepts to students,
prepare workshop materials, and keep necessary workshop records
Develop a list of prospective members to join the organization and develop follow-up strategies
to convert prospects into members
Manage the membership renewal process, including reminding members of their renewal date,
following up with late renewals and identifying lapsed members so they can be reactivated
Break Up the Barriers, powered by AIESEC, in collaboration with municipalities, NGOs and
rehabilitation centers, aims to provide disabled people necessary knowledge and skills by
workshops and activities delivered by interns to broaden their horizons and empower them for
their steps in the future. By the project also the general society will gain awareness about
disabilities issues to help them integrate better into society
The Master in Cyber Security is a computer-based degree that includes studying communication networks and technologies while including a discussion of legal and ethical issues in computer security. You have the opportunity to learn about forensic issues that help find the source of a data hack.
Bachelor of Science in Computer Science (BSCS) is a four-year program that includes the study of computing concepts and theories, algorithmic foundations, and new developments in computing.
URL removed due to policy violation. Please contact support for further information.