Send me more jobs like this
Get Email Alerts
Job Summary
Roles and Responsibilities
Policies
- Assist and coordinate in the development and review of information security policies, standards and procedures
- Ensure policies support compliance with any external requirements
Information Security Awareness
- Develop and conduct awareness sessions for IT Staff, End Users and contractors
- Participate in planning and content contribution for periodic Awareness Campaigns
Information Security Incident Response
- Participate in Information Security Incident Response Plan Development
- Participate in Information Security Incident Handling and Response
- Perform Analyses of Information Security Incidents
- Recommend rectifications and identify lessons learned from incidents
Risk Assessment and Incident Prevention
- Participate in ongoing IT risk assessment activities
- Recommend new and assess current information security controls
- Recommend methods for vulnerability detection and remediation
Vulnerability Assessment and Penetration Testing
- Conduct periodic and on-demand Vulnerability Assessment and Penetration Testing
- Conduct periodic and on-demand Vulnerability Assessments and Penetration Testing on IT systems and Applications
Information Security Metrics/ Key Performance Indicators
Develop, review and report on Metrics and Key Performance Indicators for Information Security
Disaster Recovery and Business Continuity
- Review Disaster Recovery Plans and Preparations and recommend improvements
- Review and report on results of Disaster Recovery Drills
Knowledge Transfer
Work closely with the company staff assigned to information security roles and transfer relevant information security knowledge
Reporting
- Assist in preparing Information Security Reports for the company’s Management.
- The Information Security Officer shall produce summary reports of all activities performed on a monthly and quarterly basis to the company.
Experience Required
- Knowledge of Computer and Network Forensics
- Minimum 3 years of experience in Information Security Field
- Understanding of Risk Management principles
- Penetration Testing and Vulnerability Assessment experience
Minimum Qualifications
- University Degree in computer/ Electronics/ related area
- CISSP – Certified Information Systems Security Professional
- CEH – Certified Ethical Hacker.
Key Skills
- Risk Assessment
- Information Security Awareness
- CISSP
- Disaster Recovery
- Knowledge Management
- Risk Management
- Testing
- Security
- Security Awareness
- Security Operations
- IT Risk Management
- Vulnerability Research
- Business Process Improvement
- Network Security
- Networking
Red Castle is a well-known retail destination in Dubai, United Arab Emirates, offering a wide variety of products designed to meet the needs of families and children. The store features an extensive selection of toys, educational materials, baby products, nursery essentials, and lifestyle accessories from recognized international brands.