Main Purpose of this job :
- Protect the organization's computer networks and systems against a range of cyber threats, such as hacking attempts, data breaches, and different types of cyber attacks. The
responsibilities of this role include creating, deploying, and overseeing security strategies and technologies to defend the organization IT security.
Responsibilities :
- Lead the strategic direction, development, and implementation of cybersecurity solutions and practices to protect the organization from sophisticated cyber threats and vulnerabilities.
- Serve as the foremost cybersecurity expert within the organization, providing deep technical expertise and leadership in the design, evaluation, and optimization of complex security architectures.
- Develop comprehensive cybersecurity frameworks that align with industry best practices and regulatory standards, ensuring the organization's resilience against cyber attacks.
- Conduct sophisticated risk assessments and threat modeling exercises to identify potential security gaps and develop advanced strategies for mitigation and prevention.
- Lead the incident response and crisis management efforts for high-impact security breaches, coordinating with cross-functional teams to ensure rapid containment and recovery.
- Drive the adoption of cutting-edge security technologies and methodologies, including artificial intelligence and machine learning, to enhance detection and response capabilities.
- Establish and maintain strong relationships with external cybersecurity agencies, industry groups, and technology partners to stay abreast of emerging threats and trends.
- Develop and manage the cybersecurity budget, ensuring strategic allocation of resources to high-priority projects and initiatives.
Qualification :
- Advanced degree in Computer Science, Information Security, or a related field, with specialized knowledge in cybersecurity.
- A minimum of 5 years of experience in Infrastructure, 3 years of cybersecurity, with at least 2 years in a strategic leadership or management role overseeing cybersecurity functions.
- Professional cybersecurity certifications, such as CISSP, CISM, CCSP, or similar, are required.
- Proven expertise in developing and implementing cybersecurity strategies and architectures to protect complex enterprise environments.
- Other : Deep knowledge of the cybersecurity landscape, including emerging threats, advanced persistent threats (APT), regulatory requirements, and industry best practices.
- Other : ISO 27001
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļĩāđāļāļģāđāļāđāļ
- āđāļĄāđāļĢāļ°āļāļļāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļąāđāļāļāđāļģ
āđāļāļīāļāđāļāļ·āļāļ
- āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
āļŠāļēāļĒāļāļēāļ
- āļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒ
āļāļĢāļ°āđāļ āļāļāļēāļ
- āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļĩāđāļĒāļ§āļāļąāļāļāļĢāļīāļĐāļąāļ
āđāļĄāļ·āđāļ 20 āļāļ§āđāļēāļāļĩāļāđāļāļ āđāļāļ§āļąāļāļāļĩāđ 21 āļĄāļĩāļāļēāļāļĄ 2531 āļāļĢāļīāļĐāļąāļ āļ āļēāļāđāļāđāđāļāļ·āđāļāđāļāļĨāļīāļ āļāļģāļāļąāļ āđāļāđāļāđāļāļāļąāđāļāļāļķāđāļāļāļāļāļ§āļēāļĄāļāļąāđāļāđāļ āļāļĢāļ°āļāļāļāļāļīāļāļāļēāļĢāļāļĨāļąāļāļāđāļģāļĄāļąāļ āđāļĨāļ°āļāđāļēāļāđāļģāļĄāļąāļāđāļāļ·āđāļāđāļāļĨāļīāļāđāļŦāđāļāļąāļāļāļļāļĄāļāļ āļāļđāđāļāļĢāļ°āļāļāļāļāļēāļĢāļāļĢāļ°āļĄāļāđāļĨāļ°āđāļĢāļāļāļēāļāļāļļāļāļŠāļēāļŦāļāļĢāļĢāļĄ āđāļĢāļīāđāļĄāļāđāļāļāļēāļāļ āļēāļāđāļāđāļāļāļāļāļĢāļ°āđāļāļĻāđāļāļĒ āļāļēāļāļāļĢāļīāļĐāļąāļ āļ āļēāļāđāļāđāđāļāļ·āđāļāđāļāļĨāļīāļ āļāļģāļāļąāļ āđāļāđāļāļāļāļ°āđāļāļĩāļĒāļāđāļāļĨāļĩāđāļĒāļāļŠāļđāđ āļāļĢāļīāļĐāļąāļ āļāļĩāļāļĩāļāļĩ āđāļ ...
āļĢāđāļ§āļĄāļāļēāļāļāļąāļāđāļĢāļē: āļāļĩāļ§āļīāļāļāļĩāđāļāļĩāļāļĩāļāļĩ āđāļāđāļāđāļāļāļĒāļĩ āļāļĩāļāļĩāļāļĩ āđāļāđāļāđāļāļāļĒāļĩ āļŠāđāļāđāļŠāļĢāļīāļĄāđāļŦāđāļāļāļąāļāļāļēāļāđāļŠāļāļāļāļāļāļāļĒāđāļēāļāļŠāļĢāđāļēāļāļŠāļĢāļĢāļāđ āļāļĨāđāļēāļāļāļĨāļāļāļāļģāļŠāļīāđāļāļāļĩāđāđāļāļāļāđāļēāļāđāļĨāļ° âāļŠāļāđāļŦāļĄāđâ āļāļĒāļđāđāđāļŠāļĄāļ āļ āļēāļĒāđāļāđāļāļĢāļĢāļĒāļēāļāļēāļĻāļāļēāļĢāļāļģāļāļēāļāļāļĩāđāđāļāļ·āđāļāļāđāļāļāļ§āļēāļĄāļĒāļ·āļāļŦāļĒāļļāđāļ āđāļĨāļ°āļāļĢāđāļāļĄāļāļĢāļąāļāđāļāļĨāļĩāđāļĒāļāļ§āļīāļāļĩāļāļēāļĢāđāļāđāļāļĒāđāļēāļāļāļąāļāļāđāļ§āļāļāļĩ āļāļĩāđāļāļĩāđ āđāļĢāļēāļĄāļļāđ ...
āļŠāļ§āļąāļŠāļāļīāļāļēāļĢ
- āļāļēāļĢāļāļąāļāļāļēāđāļāļ·āđāļāļāļ§āļēāļĄāđāļāđāļāļĄāļ·āļāļāļēāļāļĩāļ
- āļāđāļēāđāļāļīāļāļāļēāļ
- āļāļģāļāļēāļāļāļāļāļŠāļāļēāļāļāļĩāđ
- āļāļĢāļ°āļāļąāļāļāļĩāļ§āļīāļ
- āļāļĢāļ°āļāļąāļāļŠāļąāļāļāļĄ
- āļāļĢāļ°āļāļąāļāļŠāļļāļāļ āļēāļ
- āļāļķāļāļāļāļĢāļĄ
- āđāļāļāļąāļŠāļāļķāđāļāļāļĒāļđāđāļāļąāļāļāļĨāļāļēāļ
- āļāļĢāļ°āļāļąāļāļāļļāļāļąāļāļīāđāļŦāļāļļ
- āđāļāļāļąāļŠāļāļķāđāļāļāļĒāļđāđāļāļąāļāļāļĨāļāļĢāļ°āļāļāļāļāļēāļĢ
- āđāļāļĢāļ·āđāļāļāđāļāļāļāļāļąāļāļāļēāļ
- āđāļāļĢāļāļāļēāļĢāļŠāđāļāđāļŠāļĢāļīāļĄāļāļļāļāļ āļēāļāļāļĩāļ§āļīāļ
- āļŠāđāļ§āļāļĨāļāļāļāļąāļāļāļēāļ
- āļŠāļĄāļēāļāļīāļāļāļīāļāđāļāļŠ
- āđāļāļāļēāļŠāđāļāļāļēāļĢāđāļĢāļĩāļĒāļāļĢāļđāđāđāļĨāļ°āļāļąāļāļāļē
- āļāđāļēāļĒāļāđāļēāļāļģāļāļēāļāļĨāđāļ§āļāđāļ§āļĨāļē
- āļāļāļāļāļļāļāļŠāļģāļĢāļāļāđāļĨāļĩāđāļĒāļāļāļĩāļ