SME Security Operations & Governance Manager
PAPEL Payment Servic e P rovider
Total years of experience :13 years, 8 Months
Lead, coach cybersecurity operations team and as contact person in the escalation chain.
• Lead cybersecurity management and coordinate with GRC to comply with UAE, Turkey and UK
regulation Central Bank, PCI DSS, NESA, ISO 27001 and other local regulations (policies,
standards, baselines, guidelines, and procedures).
• Prepare cyber governance budget and perform performance reviews.
• Create and maintain the enterprise’s security architecture design and awareness program.
• Select and acquire security solutions or enhancements to existing security solutions to improve
overall enterprise security as per the enterprise’s existing procurement processes.
• Supervise all investigations into problematic activity and provide on-going communication with
senior management.
• Supervise the design and execution of risk assessments, business continuity, disaster recovery,
and incident management plans
• Technical design, architecture, development, triage, prioritize and investigate in SIEM, SOAR,
EDR, Anti-DDoS, DLP, IAM and other deployed solutions.
• Ensure all investigations requiring a security incident are raised in agreement with SLAs / OLAs
• Manage infrastructure technology (Mobility, Security and Cloud) risk control self-assessments.
• Review and provide advice on the creation of IT Infrastructure and Security SOPs.
• Improves security positioning through process improvement, policy, audit, automation and the
continuous evolution of capabilities.
• Escalation points and follow-up activities related to information security incidents, breaches,
and forensic investigations.
• Working with Red Team and VA to patch the findings and also engaged in purple team activities.
Manages the allocation of team resources according to operational requirements.
• Provide parodic threats report to senior management,
• Semi-quantitatively analyzed cybersecurity risk to identify highest risk weaknesses for a system.
• Revise and develop processes to strengthen the current CTI & SOC Framework, Review policies
and highlight the challenges in managing SLAs
• Provide direction of business process as it relates security architectures and operations
• Build and present customs cases, dashboards, based on threat feeds and OSINT and SOCMINT.
• leveraging the MITRE ATT&CK framework, Cyber Kill Chain and threat modeling.
• Ownership and management of regular KPI’s metrics and reporting for CTI Team delivery
• Manage GRC Implementation processes and continuously monitor information security
controls, risks and compliance oversight of IT Policy and processes.
• Developed concise, tailored cybersecurity awareness content.
• Track and implement corrective action plans resulting from audit findings
• Evaluate and recommend cybersecurity GRC tools suitable for enhancing existing
systems, performance, or operational stability.
• Support Internal Audits ( of processes, documentation for External Assessment ( ISO,
PCI-DSS)
• Prepared, executed, and reported on audit of cybersecurity controls to include interview,
document review, and testing of systems to support compliance audit activities.
• Manage SOC Team in investigating and responding to cyber-attacks.
• defining cyber security architecture and technology strategies, standards, principles, and
guidelines
• Work with Business Continuity management to ensure that the disaster recovery (crisis
management) and business continuity plans drive disaster recovery (DR) strategy and
procedures.
• Implement Security Standard and demonstrate best practices in ISMS, PCI - DSS and
documentationas required .
• Prepare and review Request for Proposals (RFP ) for IT security .
• Formulate systems and IR methodologies as well as respond to security related events
and assist in remediation efforts.
• Support internal and external ISO audit teams through audit management in
periodic audits of the ISMS
• Design security platforms and their associated infrastructure.
• participate in technology project committees to ensure adequate and timely
governance and risk reviews.
• Implements security controls, risk assessment framework, and
program that align to regulatory requirements, ensuring
documented and sustainable compliance that aligns with
business objectives.
• Support compliance monitoring to ensure compliance with
technical security standards implementation and Training
• Manage Kaspersky Lab solution ’s, Fortinet and work with Tier 2
SOC as Malware analyst and DF Investigator to identify and
analyze host ( File System, Disk, volatile/live
memory ) and also network .
• Identify all security loopholes and provide efficient
resolutions to management and assist in deployment of all
security technologies and maintain all architecture and
network security and analyze all designs.
1- Install all new hardware, systems, and software for networks.
2- Install, configure, maintain network services, equipment and devices.
3- Supports administration of servers and server clusters.
4- Manages all system back-up and restore protocol.
5- Plans and supports network and computing infrastructure.
6-Perform troubleshooting analysis of servers, workstations and associated system .
7- Documents network problems and resolution for future reference.
8- Monitors system performance and implements performance tuning.
9- Manage user accounts, permissions, email, anti-virus, anti-spam.
10- Requires a thorough knowledge of networking essentials.
11- Oversee software and network security.