نظرة عامة
يعد هذا الدور حاسماً في حماية البيانات الرقمية وضمان أمن الأنظمة. يهدف شاغل الوظيفة إلى حماية المعلومات من التهديدات الإلكترونية والوصول غير المصرح به، وضمان استمرارية الأعمال، والامتثال للوائح الأمنية.
المسؤوليات
- حماية البيانات الرقمية من السرقة والتلف والوصول غير المصرح به.
- تنفيذ اختبارات الاختراق وتقييمات نقاط الضعف لتعزيز أمن الأنظمة.
- ضمان الامتثال للوائح الأمنية والخصوصية.
- تقديم تقارير منتظمة عن الوضع الأمني والتحديات.
- الاستجابة لطلبات الدعم التقني (L3) ضمن مجال الخبرة.
- التعامل مع طلبات الدعم في مجالات أخرى عند الضرورة، مع الاستعانة بدعم الموردين.
- الاضطلاع بالتعلم والتطوير الذاتيين بشأن موردين استراتيجيين على مستوى تقني مفصل.
- تنفيذ عمليات التثبيت والتحديثات والتغييرات على مستوى الخدمات المهنية.
- العمل تحت توجيه عام وإدارة المهام اليومية.
الامتثال والرصد
- دعم العملاء عبر خدمات مهنية عن بُعد أو في الموقع.
- التواصل مع أصحاب المصلحة بشأن قضايا أمن المعلومات وتقديم توصيات.
- مراقبة الاستجابة للرسائل الإلكترونية الاحتيالية وأنشطة الاختراق.
- ضمان بقاء الأنظمة آمنة وعاملة.
- تقديم تقارير منتظمة عن الامتثال والرصد.
المهارات المطلوبة
Risk AssessmentCyber Security AdministrationCyber Security DesignCyber Security MonitoringCyber Security Testing
Job Description
. Job Purpose Protects digital data from theft, damage, or unauthorized access. Prevent data breaches, block cyber threats, and ensure systems remain secure and operational. Conduct penetration tests, vulnerability assessments, and ensuring compliance, with regular reporting on security posture. Key Accountability Areas IT Business Continuity: Respond to support tickets within your sphere of experience (L3 only). Be asked to cover support tickets in areas outside of your core area of experience, invoking vendor support where required. Be required to undertake self-directed learning and development on strategic vendors at a detailed technical level such that you feel comfortable in performing installation, upgrades, and changes at a professional services level. Work under broad direction, personally managing your day-to-day tasks according to urgency and priority. Compliance and Monitoring: Be required to support clients through remote, or on-site professional services delivery. Liaise with stakeholders in relation to cyber security issues and provide future recommendations. Monitor and respond to 'phishing' emails and 'pharming' activity. IT Security Consultancy: Assist with the creation, maintenance, and delivery of cyber security awareness training for colleagues. Give advice and guidance to staff on issues such as spam and unwanted or malicious emails. Reporting: Generate reports for both technical and non-technical staff and stakeholders. Maintain an information security risk register and assist with internal and external audits relating to information security. Role Accountability HR Proficiency: Ability to obtain updated soft and technical skills related to the job. Delivery: Perform the planned activities to meet the operational and development targets as per delivery schedules. Utilize resources effectively to achieve objectives within efficient cost and time. Provide a periodic report formatted by detailing the deviation and execution of planned tasks. Problem-Solving: Solve any related problems arise and escalate any complex operational issues. Quality: Ensure quality requirements to develop effective quality control and processes including specifications for products or processes or related activities. Business Process Improvement: Coordinate well-defined written systems, policies, procedures, and seek automations opportunities as much as possible. Compliance: Comply to related policy and procedures and work instructions. Health, Safety, and Environment: Ensure compliance of relevant safety, quality, and environmental management procedures and controls within defined area of work activity to guarantee safety, legislative compliance, and delivery of high-quality products/services. Academic Qualification Bachelor Degree in Computer Science or Any relevant field Work Experience 2 to 4 Years Technical / Functional Competencies Risk Assessment Cyber Security Administration Cyber Security Design Cyber Security Monitoring Cyber Security Testing
