in

Chief Technology Officer | Spiral Security Solutions

Employment:

Full Time

– Develop the technical aspects of our company’s strategy
– Research any new technologies that may potentially increase our company’s competitive advantage
– Create a timeline for development and deployment of technology services
– Assist other departments in using technology effectively
– Monitor system infrastructure
– Ensure system infrastructure is functioning and working efficiently
– Build processes for data protection and quality assurance
– Monitor Key Performance Indicators and metrics
– Keep track of IT budgets in order to update the performance of technology
– Ensure the IT budget has no unnecessary expenses
– Reduce the risk of technological breaches
– Protect sensitive digital information
– Respond to feedback from stakeholders and use it to make improvements or adjustments needed to our technology
– Make executive decisions regarding our company’s technological needs
– Make sure regulatory standards are met
– Oversee any changes in system architecture
– Manage digital assets
– Deploy and implement a disaster recovery plan in the event of a breach
– Plan and implement appropriate use policies for employees
– Develop and implement all of our internal communication systems, including email and messaging
– Develop and implement networking safeguards
– Communicate our technology strategy to our partners as well as investors

– Able to multitask, prioritize, and manage time efficiently
– Able to build strong interpersonal relationships with peers, brand leaders, and other senior management throughout the company
– Excellent leadership, team building, and management skills
– Encouraging to team and staff; able to mentor and lead
– Excellent verbal and written communication skills
– Able to align multiple strategies and ideas
– Confident in producing and presenting work
– In-depth understanding of the industry
– Bachelor’s degree in information technology, computer science, or related field; Master’s degree in information technology or a technology-related discipline preferred
– Experience with technology relative to industry; Node.JS, MongoDB, Solr, jQuery, Angular, AWS, IIS, GitHub, Grunt/Gulp, Java/C, Selenium, Appium, Android Studio, Swift
– Responsible for developing security systems using algorithms and cyphers to encrypt sensitive data
– Has a good grasp of cryptographic security systems and their related algorithms. They will be responsible for designing robust and – as far as possible – secure systems that are not vulnerable to penetration or hacking.
– Adept in identifying weaknesses and then designing robust security systems in order to negate those risks.
– Must have a deep understanding of mathematics and statistical modelling techniques, enabling one to understand fully the implications of the varied encryption techniques available.
– Experience developing and deploying signatures (e.g. YARA, Snort, Suricata, HIPS)
– Understanding of mobile technology and OS (i.e. Android, iOS, Windows), VMware technology, and Unix and basic Unix commands
– Familiarity with the DOD Information Assurance Vulnerability Management program.
– In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. Nitro/McAfee Enterprise Security Manager, ArcSight, QRadar, LogLogic, Splunk)
– Proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, and RSA Security
– Strict adherence to company philosophy/mission statement/sales goals
– Proficient computer skills, Microsoft Office Suite (Word, PowerPoint, Outlook, and Excel)
– Excellent analytical and time-management skills
– Should act a Senior Developer whenever required
– Ensuring proper Coding standards followed and quality of the product are always on the top notch matching the industry standards

Spiral Security Solutions is an independent provider of high-qualified consulting services in the field of IT Security. Through intensive research, we ensure the continuous training of our employees and use the results to protect our customers from tomorrow’s threats. With our services, we take a holistic approach.


Source: Job Posting - gulftalent.com


Tagcloud:

Associate Data Analyst – Commercial | Chalhoub Group

Full Stack Web Developer | Propel Consult