More stories

  • in

    Data Security & Encryption Services Consultant | IBM Middle East

    Employment:

    Full Time

    Information and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analyzing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client’s organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.Your Role and Responsibilities The Data Protection and Encryption Services Consultant (based in Riyadh, Saudi) is responsible for deploying and supporting the Guardium suite of security products including I BM Guardium Database Activity Monitoring (DAM) and Guardium Data Encryption for IBM customers. The Data Security and Encryption Services Consultant will be a key performer and critical team member in delivering IBM DAM, Encryption and Data Security projects across some of the most exciting clients in Saudi Arabia and the region. The candidate will help implement infrastructure and run long term Encryption and DAM projects and programs that support a holistic Data Security Protection. The candidate should be knowledgeable about how DAM & Encrpytion fits into the broader Security Program and generally understand Data Security concepts around data loss prevention (DLP), tokenization and masking, database activity monitoring, Cloud Access Security Brokers (CASB) and be able to convey security offering capabilities during pursuits. You will help drive a data-centric protection agenda for clients that is tool agnostic, bringing the best that IBM and its strategic partners have to offer around structured data protection to clients. You will be able to apply a consulting approach using knowledge gained from previous roles, experiences and engagements, IBM’s intellectual capital, knowledge of the market/industry, and your own research to address client’s security challenges. This includes working as a team member with client personnel to identify functional and non-functional requirements and subsequently working on the identification, justification and design of the client’s solution. We pride ourselves on being vendor neutral and developing solutions that are the best fit for our customers’ requirements. This means you won’t just work with IBM technology; you will work with technology from of our alliances and other vendors. Are you passionate about keeping current and open to new ideas? To develop your knowledge, along with the cooperative nature of the team, you will be encouraged to constantly learn and improve by visiting industry events and workshops. You will also have access to the global IBM education portal which you are also encouraged to explore as we believe that education and development should not be exclusively security based. Making time to think and explore leads us to develop new ideas and to be better able to help our clients. We are focused on developing talent and industry leading skills. IBM believes in career growth and flexibility. If your desire is to help empower people with unmatched security while working in a supportive and engaging environment, your career and your future will be made with IBM. Projects are based across the Saudi Arabia, often on client premises. The expectation of team members is that they will travel to support clients on site across the region if need arises. All permanent IBM employees have the opportunity to apply to work flexibly under the IBM Flexible Working Policy. Any flexibility is subject to prior management approval in line with business needs. General responsibilities – Create architectural designs that translate into solution requirements – Creating & delivering the solution element of security proposals, this could be administrative, operational or technical – Assisting Sales with responding to requests for proposals and plan the strategy for a given client in responding to client engagements. – Defining and creating a solution that meets the client’s requirements, is deliverable and commercially viable – Understanding the Risk Posture of the client, including their drivers and apatite, legal, regulatory and compliance drivers for the client – Understanding the functional and non-functional requirements of the system – Refining the Security architecture to support the functional design

    Required Technical and Professional Expertise – At least 8-10 years’ experience as Guardium Data Encryption Consultant or DAM Consultant defining and delivering data security solutions in complex multi-technology environments – Proposal & Solution shaping & development – Requirement definition and refinement – Experience Delivering large projects/Architectures for at least two of the following Data Security Technologies: Guardium DAM, Guardium Data Encryption, CASB, DLP, Classification, Data Labeling etc Preferred Technical and Professional Expertise – Stakeholder and scope management – A recognized certification in security appropriate to the role for example: CISSP, CISMP, CompTIA Security +, ITIL qualification etc. – Fluency in English Required and Preferred consulting and technical skills Consulting Skills:- Consider, understand and document client requirements – Effective writing, communication and presentation skills – The ability to work easily with diverse and dynamic teams – Comfortable working in a project based / client serving model – Ability to absorb professional knowledge quickly and develop skills – Ability to work in a matrix management model – Challenge the validity of given procedures and processes with the intent to enhance and improve – Demonstrated analytical skills – Engage with other teams in IBM Security and the wider IBM, to put a value proposition to clients and help win new business; – Deliver agreed pieces of work either as team lead or as part of a team. Technical Skills: – Understanding of concepts involving Encryption/Tokenization, Database Activity Monitoring technologies, Data Loss Prevention (DLP) etc for clients to help address risk and to enhance our clients’ security posture. – Knowledge of and hands-on experience with SQL language, – Knowledge and understanding of relational databases – Excellent understanding of data encryption – Understanding of enterprise authentication and web security – Excellent understanding of the internet protocols TCP/IP, HTTP, SSL/TLS etc. – Experience of public key infrastructure (PKI) – Will have the ability to help architect DAM solutions for customers. – Ability to work with clients to understand requirements and problem-sets and design solutions to address their Data Protection needs and DAM use cases. – Willingness to learn new technology and explore the Data Security product space and assess technology from vendors. – Guardium industry experience is mandatory – Understanding Network and product software security concepts is desirable – Understanding of enterprise application environment architecture is desirable – Experience with Big Data technology and environments is desirable – Experience with cloud environments is desirable – Experienced with database environments such as Oracle, Informix, SQL Server, UDB/DB2, Informix, MySQL, Teradata and/or Sybase is desirable

    For more than six decades, IBM Middle East & Pakistan has played a vital role in shaping the information technology landscape of the region. Today, IBM is part of the region’s technological fabric, solving real-world business and societal challenges, through its offices in UAE, Saudi Arabia, Qatar, Kuwait and Pakistan, and also a diversity of centers across the region.

    Within the region, IBM currently has groundbreaking initiatives in cloud computing, analytics, mobile, security, as well as nanotechnology, eGovernment, healthcare and many more, collaborating with leading educational institutes and governments. IBM supports hundreds of clients to drive transformation through technology, contributes to regional research & development programs and has an active Corporate Service Corps (CSC) program.

    Reinvention is a keyword in the company’s history and, today, IBM is much more than a “hardware, software, services” company. IBM is now emerging as a cognitive solutions and cloud platform company. More

  • in

    Web/Window Developer | The Centre of Excellence for Applied Research & Training (CERT)

    Employment:

    Full Time

    Technical expertise: .Net with C# and SQL Server at least minimum of 5+ years of experience, ASP.NET, WCF, MVC, Web API, C#, HTML, AJAX, JSON, LINQ, and JavaScript. Design reports using Crystal report and HTML builder.

    Experience with GIS Systems.

    The Centre of Excellence for Applied Research & Training (CERT) is the commercial, research and training arm of the Higher Colleges of Technology (HCT), which is the largest higher education institution in the United Arab Emirates.

    Since its foundation in 1996, CERT has been at the forefront of national development, through life-long learning and technology solutions that deliver value for leading organizations in the UAE and the region. It is uniquely positioned at the intersection of academia, industry, and government, offering integrated solutions that contribute to industry competitiveness and government excellence. More

  • in

    Solution Architect – Microservices | Stanley James

    Employment:

    Full Time

    We are currently recruiting a number of Solution Architects – Microservices on a 12 month renewable contract basis in Dubai. This is an excellent opportunity to further your career working on cutting edge transformation projects within an industry leader.

    Applications are sought from those with at least 7 years of progressive technical experience where you can demonstrate hands on technical expertise that has progressed to working in a business facing architect role. It is essential that you have expertise in Microservices and can demonstrate this by multiple enterprise scale projects. You will have a Bachelors Degree in Computer/Information Sciences combined with an excellent command of the English language.

    Stanley James is a privately owned recruitment business with offices in both Dubai and Cape Town allowing us to have global reach and a strong presence across EMEA and APAC. We have an expert team of recruitment specialists that are people centric, knowledgeable and driven to connect talent across all corporate functions. We are the partner of choice for SMEs, niche industry specialists and enterprises across the Technology, Financial Services, Management Consultancy, Legal, Construction & Engineering and Energy & Oil Gas sectors.

    We typically recruit a wide range of skillsets across all corporate services, front/back office functions and commercial leadership teams. This includes Finance, Information Technology, Legal, Sales & Marketing, Engineering, C-Level/Leadership, Business Change, Operations, Special Projects and Business Support Services. More

  • in

    Consultant Procurement – Supply Chain Practice | NSI & Bluefin Talent

    Employment:

    Full Time

    A specialist management consultancy focused on procurement and supply chain is currently hiring for a Consultant level.• Given the growth the firm is going through, they are looking for bright graduates with some consulting experience to join the team in Saudi. • Consultants are responsible for managing key relationships with client stakeholders, leveraging their institutional knowledge and expertise, and ensuring buy-in to the agreed strategies. • While a strong grasp of the detail and a hands-on approach are essential, excellent interpersonal and leadership skills are key to success in this role.

    Requirements :• Must have some relevant management consulting experience of at least 2 years within a leading consultancy.• Preferably within procurement and/or supply chain• Must have experience working in the KSA market• An exemplary academic background; preferably with a top degree in Engineering, Science, Business, or Economics• Fluency in Arabic (in addition to English) is highly desirable• Must have the right to work in KSA

    New Sourcing International (NSI) / Bluefin Talent have partnered so to offer a specialized recruitment solution within the Consulting and Financial services domains.

    Working together as a specialist search and selection agency, we concentrate on blue chip financial services and strategy / technology consulting organizations across Europe and the Middle East; focusing exclusively on Financial Services, IT and Risk. Being niche allows us to offer a premium search service, tailored to overcome the technically challenging nature of recruitment for the specialist functions that we work.

    We are dedicated to representing best of breed candidates in the region in our dedicated fields of employment. As such we are a leading outfit for placing ex-pats and internationally educated students in the region.

    Our biggest unique selling point, is that we are steered by a dedicated team of ex-financial services and industry professionals. This allows us to offer a level of candidate pre-screening for roles, which is largely anomalous to the recruitment profession. Our ability to bridge the technical knowledge gap typical recruiters encounter, coupled with a thorough delivery process allows us to drive consistently superior results for our clients sourcing requirements. Designed to provide a fast and efficient turnaround, we minimize the use of internal resources our clients spend vetting inadequate profiles, allowing them to quickly get back to focusing on their strategic goals.

    Our strength lies not only in the specialist nature of our firm, but also in the commitment we show towards our clients and candidates. We endeavour to build long-term relationships and recognise the crucial nature of communication throughout the recruitment process. Excellence, integrity, respect and transparency are cornerstone to the culture we promote. More

  • in

    Credit Analyst, Business Banking | Commercial Bank of Dubai (CBD)

    Employment:

    Full Time

    The role of the Job Holder is to take key decisions as well as to underwrite individual applications of Customers applying for Retail Banking products – Mortgage Loans, Personal Loans, Auto Loans and Credit Cards, BAF as defined in the Retail Credit Policy of the Bank.The job holder works as a checker, which means that he/she has delegation to approve high value transactions typically around avg AED 5O0K to AED 1.0 mill exposure depending on the Product, and also reviews deviations (out of policy cases) and restructuring cases to be proposed to the delegated authorityPrincipal Accountabilities- Ensure quality underwriting of Credit Applications as per Approved credit policies and within the given Delegation of Authority. With minimum error rate.- Maintain high level of productivity with no compromise in the quality of processing.- Check and approve applications within his/her delegation.- Evaluate and escalate applications with judgmental and deviations on the basis of borrowers character and integrity, capability of repayment, business, economic and personal conditions, capital input and collateral available to the proper authority as defined in the Credit Policy of the Retail Banking PPGs.- Communicate the decision to the Front end via an email Draft/Pre approval Letter.- Detailed assessment of the Business verification reports and other Business related documents.- Final Offer Letters to be check and signed post completion by the maker.- Reconciliation of invoices for Field Visits and Perfios.- Analysing and escalating restructure cases.- Ensure completion of cases within prescribed TAT and full adherence to SLA with Business Group- Adherence to Operational Risk Guidelines.- Full Compliance to all relevant policies and procedures governing Risk-based underwriting & ensure a minimum satisfactory Internal audit rating. NO Adverse audit findings with HIGH RISK Impact- Resolution of all audit findings within prescribed time frame.

    RequirementsQualification & Experience:- Minimum of a Bachelor’s Degree – Strong working knowledge of business software applications, particularly spreadsheets- Minimum of 4 to 5 years of underwriting experience in credit related work- Written and spoken English – Arabic preferred- Good understanding of banking operations, Bank policies, procedures, guidelines, statutory requirements, market conditions.

    In 1969, when we at Commercial Bank of Dubai started out little did we know that sheer grit and determination would get us where we are today. An Emiri Decree issued by His Highness the Late Sheikh Rashid Bin Saeed Al Maktoum, the founder of modern Dubai, laid the cornerstone of Commercial Bank of Dubai. We started out as a joint venture of Commerzbank, Chase Manhattan Bank and Commercial Bank of Kuwait. A minority stake was held by a few UAE businessmen.

    By 1982, little more than a decade later, we evolved into a National Public Shareholding company. A feat complimented by an exponential increase in the capital base and mammoth restructuring of our operations. The feather in the cap came when the Government of Dubai became a key shareholder.

    Over the decades, we have transformed ourselves into a progressive and modern banking institution. We are supported by a sturdy financial base and reigned by a strong and stable management. The proof of which lies with our customers who have stood by us over the years. More

  • in

    Office Manager / Executive Assistant – Arabic Speaking | Charterhouse

    Employment:

    Full Time

    Charterhouse are working with a reputable organisation within the financial services sector who are looking to hire a highly polished and presentable experienced Office Manager / Executive Assistant who is an Arabic speaker to work in their Dubai office.This role will see you provide high level administrative support to a C-Level Executive in a fast-paced office. You will also provide support with office management and assist in coordination of board meetings and maintaining board records accurately. You will contribute and assist in the implementation of any policies or procedures, offering a strategic approach to the organisation’s system.In addition you will be required to prepare communications and liaise with stakeholders to help drive the accomplishment of tasks in an effective and efficient manner. This is a full time role and your responsibilities will also include receiving and screening calls, corresponding with visitors and completing any complex travel and diary management tasks.This full time role will see you working in a timely and analytical manner, and will have you managing a variety of priorities and coordination of high level administrative duties.

    To be considered for this role you must hold a bachelor’s Degree and have at least 5 years’ experience as an Office Manager within the UAE. You must have experience within the financial services and it would be highly advantageous if this is specifically within a reputable Investment firm. You must have high-level communication skills and your verbal and written skills should be excellent in both Arabic and English. The successful candidate must be organised and detail orientated, with an energetic personality who has strong team player attributes.

    The Charterhouse brand and business was launched in Dubai and the Middle East in April 2004 by a team of international recruiters and management consultants, after its inception in Sydney, Australia in September 2003. Charterhouse Middle East is now positioned as the leading regional recruiter within its area of disciplines and functional markets.

    Charterhouse offers professional and bespoke contingency and retained search services to all sectors of the market. Service quality is guaranteed, thanks to a particular focus on flexibility. Charterhouse was the first international search and selection business to establish Dubai as its base. The growth in the Middle East region has been mirrored by Charterhouse globally, with offices now in Abu Dhabi, Qatar, Hong Kong, Singapore, Melbourne, Perth and Sydney. More

  • in

    Sales Telecaller – Executive | A Leading Company In UAE

    Employment:

    Full Time

    Our company is urgently looking to recruit experienced Credit Cards & Personal Loans Direct Sales / Telesales Executives at our Dubai Office.

    The ideal candidate will be responsible for building and maintaining a strong sales pipeline. You will do so by identifying key business opportunities and segmented prospects. Your goal will be to meet or exceed our monthly targets and increase our revenue. Salary + Incentive. Visa provide by company.

    A leading company in UAE. More

  • in

    Cyber Ops – Network Security Consultant | Almawarid Group

    Employment:

    Full Time

    Manage the overall endpoint security by detecting, analyzing, monitoring, handling, preventing and reducing the effect of the threats and vulnerabilities to the company networks in line with the current endpoint security technologies. Oversee the overall network security at the company. Identify threats to the company networks or security attack vectors and implement the required network protection measures. Roles: • Evaluate the network security protocols, topologies and device configurations. • Analyze log files related to network traffic, firewalls, IDS, IPS, NAC and DNS. • Identify any suspicious activity and its effect on the data and systems. • Implement and test the firewalls, NAC, IDS and IPS systems• Conduct periodic network security audits. • Implementing the network security policies and procedures. • Conduct risk assessments, employee trainings and network monitoring.• Participate in incident response and business continuity management. • Manage VPN profiles and access. • Perform in-depth analysis of the endpoint security and solutions. • Create and install the required endpoint protections such as anti-virus, firewalls etc. based on the gaps identified in the analysis. • Ensure that end point security solutions are implemented across the systems in the company and identifies inconsistencies. • Identify new attack vectors and requirements for detecting an attack.• Plan, develop and implement feature testing. • Maintain up-to-date signatures on the endpoint security agents.• Develop new signatures and rules at the endpoint security agents to detect cyber threats (i.e. YARA rules, queries) • Develop a blacklist/whitelist of the software list for the company endpoints based on known file hashes and functions. • Maintain compliance with the company policies and other regulatory requirements. • Define the endpoint detection strategy and solutions in coordination with the senior management. • Create and conduct trainings on endpoint security practices for the Company employees.• Identify the list of network devices managed the Cybersecurity Operations function and maintain an updated asset inventory defining the criticality and ownership• Maintain a baseline configuration for the network security assets such as internal/external firewalls, IPS/IDS, NAC systems, anti-DDOS and VPN and test firewall and IDS/IPS logs against forensics requirements. • Define roles and responsibilities for team monitoring Network Admission Control logs.• Develop metrics and KPIs to measure effectiveness of NAC deployment and other network perimeter controls. • Document a process for network devices to align with approved security configurations. • Schedule periodic configuration reviews to ensure network device configurations follow best practices. • Deploy Domain Name System Security Extensions (DNSSEC) across the enterprise. • Deploy and implement a file integrity monitoring tool to be used on a weekly basis. • Implement WIDS and integrate with SIEM to identify rogue wireless devices and detect attacks.• Develop a formal process to centrally manage network firewall operations.• Establish guidelines for encrypting email communications and digitally signing emails and integrate with DLP solution once deployed. • Extend content filtering capabilities to include email and file transfer. • Include DDoS prevention considerations in the enterprise security architecture and secure design processes.

    Knowledge: • Network components, their operation and appropriate network security controls and methods. • Cybersecurity related threats and vulnerabilities. • Cybersecurity authentication, authorization and access control methods.• Vulnerabilities in applications and their likely impact. • Cybersecurity defense and vulnerability assessment tools and their capabilities. • Host and network access control mechanisms. • Sources of information relating to the identification and effective treatment of vulnerabilities. • Best practices for incident response and incident management. • Cybersecurity and privacy principles and organizational requirements. • Programming language structures and logic. • Virtual Private Network (VPN) security.• National cybersecurity regulations and requirements relevant to company. • Cybersecurity policies, procedures and regulations. • Windows and Unix ports and services. • System administration concepts for operating systems used by Company. • Networking and internet communications fundamentals. • Cybersecurity authentication, authorization and access control methods. • Vulnerabilities in applications and their likely impact. • Host and network access control mechanisms. • Best practices for incident response and incident management. • Cybersecurity and privacy principles and organizational requirements. • Programming language structures and logic. • Virtual Private Network (VPN) security. • Cybersecurity policies, procedures and regulations. • Windows and Unix ports and services. • System administration concepts for operating systems used by company. • Networking and internet communications fundamentals.• Analyze infrastructure build sheets, configuration management databases, vulnerability scans, access control lists and vendor documentation to understand software behaviors and interactions.• Use network analysis tools to identify vulnerabilities. • Network tools. • IT security principles and methods. Qualifications: • Bachelor’s degree in computer science, information systems, or related field. • 7-15+ years in an active technical cybersecurity role. • A minimum of 3+ years of related experience in Endpoint Security. • Experience with EDR and/or incident response toolkits preferred. • CISSP, GIAC Penetration Tester, GIAC Security Essentials or equal certifications. • A minimum of 7 years’ experience as a network security specialist • CEH, CCNP Security, CCSP, CCNA, GSEC, GCI, CISSP or equal certifications.• Certified CompTIA, Microsoft, or Cisco network professional preferred. • Technical troubleshooting skills.

    We are a national group formed on the foundations of social responsibility and building the acquired value with hard work and quality of outputs that contribute to creating a fertile production environment for our esteemed customers so that they can present their work in accordance with standards of balanced performance that ensures continuity and reduces the expected risk. More