More stories

  • in

    D365 F&O Senior / Analyst Programmer | Charterhouse

    Employment:

    Full Time

    Charterhouse is working exclusively with a software company which is part of a well-known Multinational group who are looking to hire a D365 F&O Senior/Analyst Programmer to join their growing team.You will be responsible for technical realisation of tasks based on functional designs in Microsoft Dynamics 365 Finance and Operations in particular building and testing new and existing functionalities. You will work alongside Solution and Senior / Technical Architects and implement technical solutions for customer requirements in D365FO.

    The successful candidate should have a minimum 3 years of experience working with Microsoft Dynamics 365 F&O in all stages of development and a university Degree within a computing or business discipline. Good knowledge on X++ and best practices including code management, unit testing methodologies and build processes. Experience in using Azure Devops and understands Devops principles. You must hold either a Microsoft Dynamics 365 F&O Core or Technical Certification.

    The Charterhouse brand and business was launched in Dubai and the Middle East in April 2004 by a team of international recruiters and management consultants, after its inception in Sydney, Australia in September 2003. Charterhouse Middle East is now positioned as the leading regional recruiter within its area of disciplines and functional markets.

    Charterhouse offers professional and bespoke contingency and retained search services to all sectors of the market. Service quality is guaranteed, thanks to a particular focus on flexibility. Charterhouse was the first international search and selection business to establish Dubai as its base. The growth in the Middle East region has been mirrored by Charterhouse globally, with offices now in Abu Dhabi, Qatar, Hong Kong, Singapore, Melbourne, Perth and Sydney. More

  • in

    Application Developer – EAI (Internship) | IBM Middle East

    Employment:

    Full Time

    Introduction As an Application Developer, you will lead IBM into the future by translating system requirements into the design and development of customized systems in an agile environment. The success of IBM is in your hands as you transform vital business needs into code and drive innovation. Your work will power IBM and its clients globally, collaborating and integrating code into enterprise systems. You will have access to the latest education, tools and technology, and a limitless career path with the world’s technology leader. Come to IBM and make a global impact!Your Role and Responsibilities – Demonstrates proficiency in Development of message flows using open-source or proprietary ESB tools and technologies – IIB, Software AG, WebSphere DataPower, SI, Tibco, Mule, others. Experienced working with Web Services SOAP and HTTP, HTTPs with SSL, Encryption, decryption. Knowledge or experience in Problem analysis, Requirement Analysis, High level Design, Low-level Design, Development, Deployment process, Testing, Documentation, production support, and Configuration of the Integration Environment. Knowledge on one or more relational database like IBM DB2, Oracle.

    Required Technical and Professional Expertise – Excellent Communication Skills – Fluency in Arabic and English- Bachelor degree in similar field

    For more than six decades, IBM Middle East & Pakistan has played a vital role in shaping the information technology landscape of the region. Today, IBM is part of the region’s technological fabric, solving real-world business and societal challenges, through its offices in UAE, Saudi Arabia, Qatar, Kuwait and Pakistan, and also a diversity of centers across the region.

    Within the region, IBM currently has groundbreaking initiatives in cloud computing, analytics, mobile, security, as well as nanotechnology, eGovernment, healthcare and many more, collaborating with leading educational institutes and governments. IBM supports hundreds of clients to drive transformation through technology, contributes to regional research & development programs and has an active Corporate Service Corps (CSC) program.

    Reinvention is a keyword in the company’s history and, today, IBM is much more than a “hardware, software, services” company. IBM is now emerging as a cognitive solutions and cloud platform company. More

  • in

    Technical Project Manager (IT) | MAYKS HR Consulting

    Employment:

    Full Time

    • SQL Programming • Database analyst• Handled software implementation• Handle technical meetings, and integrations• Create management, communication plans and processes.• Analyze and develop procedures for management and technical duties.• Define project responsibilities • Performing quality control on the project throughout development to maintain the standards expected• Participate along the staff are allocated for the project.• Maintain project time frames.• Strong communication skills to coordinate with team members.• Analytical, computer, and problem-solving skills to be able to use software and to explain the software• Organizational skills and time management skills to keep projects on track to the finish• Project managing skills to start projects and finish projects successfully

    • Living in Qatar with NOC• A bachelor’s degree in computer information systems, management information systems, or similar.• A master’s degree in technology management or business management would be advantageous.• Extensive experience in technical management, preferably in a related industry.• Advanced knowledge of SQL Programming.• Ability to diagnose faults, oversee user-testing, and implement required changes.• Ensuring optimal hardware and software functionality, as well as network security.• Exceptional communication and interpersonal skills.

    We are a Multidisciplinary HR Consultancy firm based in Qatar, with channel partners from all over the world.

    MAYKS HR Consulting has the expertise to enable you to get a high return on your company’s most valuable investment. Our headhunting processes are state-of-the-art, utilizing the best technology to perform all headhunting tasks. Our 13 years’ experience in Qatar in assessing and selecting tools, gives us the ability to serve our clients more effectively and efficiently than anyone in the industry.We consistently provide high-quality headhunted candidates from the local and international markets. MAYKS revolves around being proactive and responsive, giving us the flexibility to accommodate your needs and ensure your success. Our experts will work with you in the headhunting process to ensure that your projects are never in delay. More

  • in

    Managing Consultant – Security | IBM Middle East

    Employment:

    Full Time

    Introduction Information and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analyzing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client’s organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.Your Role and Responsibilities IBM Security Consulting team takes a holistic approach to building and operating cyber security and response solutions and capabilities that support the cyber threat management and regulatory compliance needs of the world’s largest enterprises. Our team combines robust methodologies for security intelligence and operations with industry-experienced consultants and market-leading technology. Position Description The Senior Security Consultant will take direction from the SIOC leader and work directly with the client to ensure the security solutions are implemented or improved according to the client’s business requirements. The Senior Security Consultant will work to develop solutions and capabilities to identify, analyze, and respond to cyber attacks, violations, and abuse within the client environment. Responsibilities – Manage the day-to-day interactions with various business groups, executive management, and other key business stake-holders. – Manage or lead the day-to-day operations of a cyber-defense capability on behalf of the client (if needed/required) . – Develop solution processes, procedures, and information workflows. – Develop threat models – Develop business lead use cases and correlations rules – Assist the client and consultant team as needed to ensure all aspects of the project are completed on-time. – Establish and manage project plans for SIOC engagements. – Communicate on a regular basis with the client and with IBM leadership team regarding the overall progress of the project, current challenges, risks, and other information that may impact the project – Manage engagement risk and define deliverable content. – Assist with team selection (recruiting, interviewing, etc). – Manage skill development, training, and career progression of client solution staff (if needed) . – Develop client solution staffing schedules and training plans. – Serve as the primary IBM approver for solution processes, procedures, and information workflows for the engagement. – Engages in peer-to-peer dialogue with clients about their industry and their situation – Opens new discussions and builds new opportunities with clients – Builds strong rapport with clients creating respect and trust – Opens new relationship opportunities within the client environment – Understands how to construct and gain agreement for business cases – Selects appropriate tools available to develop and validate business cases – Shapes and influences client attitudes to outcomes and key benefits for both the client and IBM – Plan and lead delivery of workshops and facilitated client events

    Required Technical and Professional Expertise – 7+ years working within the information security field, with emphasis on security operations, incident management, intrusion detection and analysis, firewall deployment, compliance efforts, and security event analysis. – 4+ years’ experience leading a security operations center team to solve business problems – Experience in designing and building security or network operations centers, implementing and managing (processes, technology, governance model, people) – Incident management process development and/or incident management experience – Ability to train level 1 and level 2 security operations center analysts/engineers – Product knowledge of SIEM: Qradar is a plus, ArcSight, SPLUNK, etc. – Depth of Knowledge in Threat modeling, Use Cases and response runbooks (A Must) – Experience in building Threat Intelligence and Threat Hunting capabilities, log management or security information management tools, Security Assessment tools (NMAP, Nessus, Metasploit, Netcat) Preferred Technical and Professional Expertise – Great customer service skills – Strong communication and presentation skills – A dvanced technical writing skills – Strong analytical skill s – Good project management skills – Comfortable working in a project based / client serving model – Drive client pursuits and engage in complex deals – Ability to work with global and diverse teams in a dynamic environment – Professional certifications to include CISSP, SANS GCIA, GMON, Cloud certifications are a plus (i.e. AWS)

    For more than six decades, IBM Middle East & Pakistan has played a vital role in shaping the information technology landscape of the region. Today, IBM is part of the region’s technological fabric, solving real-world business and societal challenges, through its offices in UAE, Saudi Arabia, Qatar, Kuwait and Pakistan, and also a diversity of centers across the region.

    Within the region, IBM currently has groundbreaking initiatives in cloud computing, analytics, mobile, security, as well as nanotechnology, eGovernment, healthcare and many more, collaborating with leading educational institutes and governments. IBM supports hundreds of clients to drive transformation through technology, contributes to regional research & development programs and has an active Corporate Service Corps (CSC) program.

    Reinvention is a keyword in the company’s history and, today, IBM is much more than a “hardware, software, services” company. IBM is now emerging as a cognitive solutions and cloud platform company. More

  • in

    Security Client Technical Specialist – Identity & Access Management | IBM Middle East

    Employment:

    Full Time

    Introduction Client Technical Specialists (CTP) are the technical experts and advisors to clients, IBM sales teams and/or IBM Business Partners. As a CTP you understand the client’s business requirements, technical requirements and/or competitive landscape. You apply your business insights, build and maintain client relationships, incorporate hardware, software and services into client-valued solutions and ensure client readiness for the implementation of technical solutions. This is an opportunity to shape the future for both IBM and its clients. Start your journey now!Your Role and Responsibilities The candidate will need to develop overall IAM strategies for our clients to help them in their digital transformation journeys. IBM boasts a broad IAM portfolio with identity governance, identity analytics, access management, password-less authentication, directories, consent management, consumer identity management, digital identity, and privileged identity management & analytics. Proficiency across the board of IAM technologies and a solid IAM industry understanding and trends is a necessity. Hands-on implementation experience can be beneficial for this position, as proof of concept and customized demonstrations are critical requirements.The candidate must have strong organization skills, multi-task effectively, and have strong communications skills, both written/verbal.Responsibilities: – Delivers technical accelerators like presentations, demos, Proof of Technology & Proof of Concepts for IBM Security IAM solutions. – Acts as IAM subject-matter technical expert to validate how a proposed solution meets and exceeds customer requirements. – Supports sales team on prospect conference calls, WebEx and onsite visits by providing product demonstrations; expertly responds to technical questions, and explains features in the context of solving customer’s business problems on Security Operations & Response. – Leads technical response to Request for Proposals (RFPs) and Request For Information (RFI) – Creates technical collateral and assets to share knowledge and expertise within IBM. – Supports partner teams by participating in technical calls and meetings with prospective customers evaluating solutions – Supports partner teams by delivering enablement session for IAM technology across the region. – Supports and deliver speeches on IAM in industry & IBM events. – Provides feedback to product management for aligning product direction with customer requirements in the Middle East market.

    Required Technical and Professional Expertise As a minimum, the candidate will have the following:- At least 7 years experience as IAM presales, IAM lead, IAM Security Architect, IAM Consultant, defining and delivering security architectures in complex multi-technology environments – Proposal & solution shaping & development – IAM assessment, strategy and roadmap development – Presentation skills for C-Level clients and technical audienes. – Knowledge of top (analysts) quadrant IAM Technologies and understanding of the IAM competitive environment. – Experience in presales or delivering projects in the relevant IAM Domains: – Governance; life-cycle, provisioning/provisioning, workflow automation, delegated administration, password synchronization, self-service, Role-Based Access Control, access management – Privileged Access Management; Vaulting, Session Recording, Access Controls methods such as Sudo. – Cloud-Native IAM: Azure, Okta, AWS or others. – Web Access Management; Single-Sign-on, Access Federation, – Privileged Access Management, Desktop Single Sign-on, Advanced and Multi-Factor Authorization, RBAC/ABAC, Application Integration. – Directory Services; LDAP, Active Directory. – Other; Desktop Single Sign-on, API / Rest / XML, RACF, ADFS, Multi-Factor Authentication, XACML, SCIM, SAML 2.0, OpenID Connect, LDAP. – Understanding of virtualization, container and DevOps processes and tools. – Knowledge of cloud platforms and technologies as well as industry trends on IAM on cloud. – Basics of Unix/Windows and network system administration, as well as HTTP/S protocols. – Understanding of Data Protection Security Domain like Database Activity Monitoring (DAM), DLP, data classification, etc. Whilst not a prerequisites, the following will be advantageous:- Stakeholder and scope management – A recognized certification in security appropriate to the role, for example CISSP or CISM. – Development and scripting: Java, Javascript, HTML, NodeJS, Unix scripting, as required for IAM solution configuration. Required Technical and Professional Expertise – CISSP or equivalent technical certification – University Degree – Ideal candidate will have 7 or more years of Technical consulting/Technical sales/ Technical Architecture experience in On Prem or SaaS solutions. – Hands on experience in the implementation, design and architecture of IAM Solutions. – Experience with Cloud based solutions and integration of IAM tools – Development experience in writing custom adapters – Good presentation skills

    For more than six decades, IBM Middle East & Pakistan has played a vital role in shaping the information technology landscape of the region. Today, IBM is part of the region’s technological fabric, solving real-world business and societal challenges, through its offices in UAE, Saudi Arabia, Qatar, Kuwait and Pakistan, and also a diversity of centers across the region.

    Within the region, IBM currently has groundbreaking initiatives in cloud computing, analytics, mobile, security, as well as nanotechnology, eGovernment, healthcare and many more, collaborating with leading educational institutes and governments. IBM supports hundreds of clients to drive transformation through technology, contributes to regional research & development programs and has an active Corporate Service Corps (CSC) program.

    Reinvention is a keyword in the company’s history and, today, IBM is much more than a “hardware, software, services” company. IBM is now emerging as a cognitive solutions and cloud platform company. More

  • in

    Cyber Security (VAPT) Consultant | Ernst & Young

    Employment:

    Full Time

    As part of our Cyber Technology Consulting team, you will be performing managed or ad-hoc vulnerability assessment and penetration testing for various clients across the Jordan region. Working with Cyber Technology consulting team, you will also perform application security assessments, code & architecture reviews, threat modelling, configuration audit, AD assessments, social engineering assessments, red/purple teaming etc. The client base spans across various sectors and includes collaboration with other teams within Advisory services. The opportunity We’re looking for a Senior Consultant/Assistant Manager with real hands-on expertise in performing cyber security assessments to join the group of our Cyber Technology Consulting team. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of our service offering. Your key responsibilities – Perform end-to-end project execution for end clients (VAPT domain) both offshore and onshore – Perform infrastructure penetration testing and vulnerability assessments – Perform web/mobile/API penetration testing. – Perform threat modelling, security code reviews and architecture reviews – Perform security configuration reviews for OS, Databases, Network & Security devices, applications etc. – Perform Active directory assessments – Perform Red Team assessments/Attack Simulations aligned to cyber kill-chain and MITRE ATT&CK – Experience with AV evasion, obfuscation, bypass windows ASR/device guard, network security controls, emails gateway filtering etc. – Experience with both commercial & open-source tools mapped to the different stages in the cyber kill-chain – Review operational logs and event console activity to determine cause of security-related events or to identify potential security related events – Analysis of the patches released by the vendors – Prepare reports and convey the observations to the top management in layman’s language emphasizing on the business risks. – Mentor junior resources or managing a group of resources.

    Skills and attributes for success – Collaborating with other members of the engagement team to plan the engagement and develop work program timelines, risk assessments and other documents/templates. – Good Communication skill and willingness to travel at a short notice – Demonstrating and applying strong project management skills, inspiring teamwork and responsibility with engagement team members – Hands on experience will tools/frameworks like Kali, Burp Suite, Nessus, Qualys, Acunetix scanners (DAST and SAST) – Good knowledge of OWASP and Secure SDLC standards – Hands on experience with programming using Python/Perl/PowerShell/C++ – Hands on experience with exploit development and VS code compilation. – Hands on experience with C2 frameworks (e.g.PoshC2, Covenant, Metasploit etc.) – Hands on experience with setting-up phishing and red teaming infrastructure – Good knowledge of encryption technologies & MiTM attacks – Good understanding of MITRE ATT&CK framework and how to leverage it. – Good understanding of AD administration, different authentication mechanisms, trust boundaries etc. – Knowledge of Linux administration, TCP/IP, DNS, Network protocols and OSI model To qualify for the role, you must have – A bachelor’s or master’s degree – 5+ years of experience working as an Information security professional with cyber security assessment background in a professional services firm. – Excellent communication skills with consulting experience preferred – A valid passport for travel. Ideally, you’ll also have – Experience with performing assessment related to Red Teaming, Network Penetration Testing, Web Application Penetration Testing, Mobile Application Penetration Testing, Secure Code review, AD Security Assessments, Vulnerability Management, Social Engineering Assessments, Wireless Penetration Testing. – OSCE, OSCP, GPEN, LPT, ECSA, CEH, CompTIA Security+ (at least two certifications are desired) What we offer We offer a competitive compensation package where you’ll be rewarded based on performance and recognized for the value you bring to our business. Plus, we offer: – Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next. – Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way. – Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs. – Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs. If you can demonstrate that you meet the criteria above, please contact us as soon as possible. The exceptional EY experience. It’s yours to build. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform, and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

    EY is a global leader in assurance, tax, transaction and advisory services. The insights and quality services we deliver help build trust and confidence in the capital markets and in economies the world over. We develop outstanding leaders who team to deliver on our promises to all of our stakeholders. In so doing, we play a critical role in building a better working world for our people, for our clients and for our communities.

    EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients. Information about how EY collects and uses personal data and a description of the rights individuals have under data protection legislation are available on our site.

    The MENA practice of EY has been operating in the region since 1923. For over 95 years, we have grown to over 7,500 people united across 21 offices and 16 countries, sharing the same values and an unwavering commitment to quality. As an organization, we continue to develop outstanding leaders who deliver exceptional services to our clients and who contribute to our communities. We are proud of our accomplishments over the years, reaffirming our position as the largest and most established professional services organization in the region More

  • in

    Transformation Consultant – Tableau CRM/Einstein | IBM Middle East

    Employment:

    Full Time

    Introduction As a Package Consultant at IBM, get ready to tackle numerous mission-critical company directives. Our team takes on the challenge of designing, developing and re-engineering highly complex application components and integrating software packages using various tools. You will use a mix of consultative skills, business knowledge, and technical expertise to effectively integrate packaged technology into our clients’ business environment and achieve business results.Your Role and Responsibilities Assists clients in the design, business architect, process development, functional implementation, and support of Salesforce CRM Applications. Experience & demonstrate understanding of overall SFDC architecture and platform. Effectively run business user design and user experience sessions. Uses consulting skills, business knowledge and SFDC CRM experience to lead business / functional discussion with the client and internal teams (design, build, test teams).

    Demonstrate experience in Agile, Scrum and Waterfall methods for Software Development Life Cycle (SDLC). Understand client’s business pain points and offer solution to address leveraging salesforce.com platform/ offerings. Provide experience in designing workflow rules to enforce business processes. Familiar with executing system and user acceptance testing, user adoption, change management and training methods.

    For more than six decades, IBM Middle East & Pakistan has played a vital role in shaping the information technology landscape of the region. Today, IBM is part of the region’s technological fabric, solving real-world business and societal challenges, through its offices in UAE, Saudi Arabia, Qatar, Kuwait and Pakistan, and also a diversity of centers across the region.

    Within the region, IBM currently has groundbreaking initiatives in cloud computing, analytics, mobile, security, as well as nanotechnology, eGovernment, healthcare and many more, collaborating with leading educational institutes and governments. IBM supports hundreds of clients to drive transformation through technology, contributes to regional research & development programs and has an active Corporate Service Corps (CSC) program.

    Reinvention is a keyword in the company’s history and, today, IBM is much more than a “hardware, software, services” company. IBM is now emerging as a cognitive solutions and cloud platform company. More

  • in

    Cyber Security Consultant – Data Protection & Privacy (DPP) | Ernst & Young

    Employment:

    Full Time

    DPP and Cyber Security are few of the most important risks facing businesses today. Organizations’ data protection & privacy capabilities were tested during COVID19 pandemic and organizations are looking for trusted consultants to enhance the capability. Also, as organizations move forward on their digital journey the cybersecurity risk exposure is increasing and there is a huge demand for trusted cybersecurity consultants. Our clients are overwhelmingly turning to EY for help and guidance on how to enhance the privacy and protect their assets, minimise business disruption and improve security. The opportunity At EY we have ambitious plans to expand our already market leading Cybersecurity practice. With investment secured, we continue to build our MENA based cyber practice and anticipate continued growth throughout the next five years. We need excellent people, to join us and to be part of our exciting growth strategy . EY is looking for a Data Protection & Privacy (DPP) Consultant (Senior Consultant/Assistant Manager/Manager level) to join our Cyber Security team in our Jordan Resource Hub based in Amman. While the role will be based in Amman, it will require extensive client related travel across the GCC and other parts of MENA region (at least 50-80%). Your key responsibilities A large part of your role will be engagement delivery and provide support to executives for business development. We’ll expect you to lead and deliver DPP and cybersecurity engagements with very minimal supervision. We also expect you to support executives in development of proposals, presentations, and other business development activities. You will be responsible for the delivery and quality of the final reports to our clients. You will have responsibility for; – Lead Privacy Impact Assessments, analyze and document assessments, work out questionnaires and standard documentation. – Supporting the standardization of Risk and IT Control catalogues for regulatory compliance. – Deploy processes and tools to help detect and prevent privacy breaches. – Deploy Data leak prevention tools and implementation of endpoint protection. – Supporting and guide our clients in adhering to the complex web of relevant national and international regulations. – Ensure a harmonized approach towards data protection and privacy by bringing together our client’s stakeholders (e.g. legal, compliance, risk, HR, security, business functions…). – Assist clients in privacy related incident response activities. – Supporting the client’s team by acting as an interim team member (e.g. security officer, security manager, security analyst). – You will be required to develop work products and presentations in Arabic – Support the cyber executives with the development of proposals, presentations, etc. – Championing EY and the cyber security team, helping to attract and retain world-class talent – Contributing to the latest thought-leadership and industry research relating to cyber security – Your role will broadly constitute circa 80% engagement delivery and 20% business development.

    Skills and attributes for success – An existing track record of successful engagement delivery in data protection & privacy and cyber security is expected of all candidates for this role. – A Big 4 background or comparable consulting experience is highly advantageous. – A broad background across DPP and security is expected with specific experience in two or more of the following areas, essential; – At least 2-8+ years of sound industry experience in one or more of the following areas: Data Protection and Privacy, privacy governance, assessment, remediation, policies, procedures, and classification, data retention concepts, access control for leading ERP/CRM systems, self-developed tools, data bases and data warehouses – Security policies and procedures, design and implementation of security policies, procedures, standards, and controls in line with regulation and/or current standards, ISO27001, NIST, SANS etc. – Data privacy, implementation of data protection / GDPR programmes to address confidentiality and security over customer, employee, or patient data. – Cyber awareness programmes, design, and delivery of cyber security awareness programmes to executive level or wider organisation – Excellent command in written and spoken English – Experience in managing professional service project teams – Willingness to travel Qualifications – Certifications like ‘Certified Information Privacy Professional (CIPP)’ or ‘Certified Data Privacy Solutions Engineer’ will be highly preferred – Security relation qualifications such as ISO 22301 LI, CBCI / CBCP, CISSP, CISM, ISO27001 lead implementer or auditor, etc. What we look for You’ll need to be highly motivated, a self-starter and a strong communicator with the ability and experience to discuss technical content in business language to board level. You’ll also need to be a team player who is not only looking to enhance their own career but recognises the value in developing others and strengthening the team. What we offer We offer a competitive compensation package where you’ll be rewarded based on performance and recognized for the value you bring to our business. Plus, we offer: – Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next. – Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way. – Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs. – Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs. If you can demonstrate that you meet the criteria above, please contact us as soon as possible. The exceptional EY experience. It’s yours to build. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform, and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

    EY is a global leader in assurance, tax, transaction and advisory services. The insights and quality services we deliver help build trust and confidence in the capital markets and in economies the world over. We develop outstanding leaders who team to deliver on our promises to all of our stakeholders. In so doing, we play a critical role in building a better working world for our people, for our clients and for our communities.

    EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients. Information about how EY collects and uses personal data and a description of the rights individuals have under data protection legislation are available on our site.

    The MENA practice of EY has been operating in the region since 1923. For over 95 years, we have grown to over 7,500 people united across 21 offices and 16 countries, sharing the same values and an unwavering commitment to quality. As an organization, we continue to develop outstanding leaders who deliver exceptional services to our clients and who contribute to our communities. We are proud of our accomplishments over the years, reaffirming our position as the largest and most established professional services organization in the region More