More stories

  • in

    ISO Consultant | One Of The Leading Total Solutions Provider In Qatar

    Employment:

    Full Time

    • They possess the complete application knowledge of the processes defined by ISO standards. • The different available versions of the structure of ISO standards are known to them; with this, they apply their knowledge to the proper place in the required process.• They thoroughly study the processes, procedures, and activities each and every function of the organization and then map them according to the international standards, so that they become more effective & efficient.

    • Time management skills• Gap analysis• Energetic• Good communication skills• The ability to work as part of a team.• Interpersonal and communication skills, both oral and written.• Creativity and innovation.• Problem-solving and strategic planning ability.• Analytical skills.• Flexibility.• The ability to cope with pressure and challenges

    One of the leading ‘Total Solutions’ provider in Qatar. More

  • in

    Senior Manager – Tax | MMJS Consulting

    Employment:

    Full Time

    – Ensure that the team renders a quality tax services to businesses.- Carryout research on new tax laws and trends.- Drafting Articles and updates to clients from time to time.- Proactively manage a portfolio of clients and report into Director and above.- Ability to review and sign off on KSA tax/zakat returns, tax/zakat advisory, and related objections.- Be involved in the financial management of clients.- Be actively involved in business development activities to help identify and research opportunities on new/existing clients.- Build client relationships with new and existing clients.- Contribute to the development of your own and team’s technical acumen.- Develop strategies to solve complex technical challenges.- Assist in the management and delivering of large projects.- Train, coach, and supervise staff.

    – Experience in business development and growing client relationships and revenue;- KSA Income tax expertise and managing tax compliance for client engagements;- Ability to provide ad hoc KSA tax consulting advice to inbound or outbound KSA clients;- Experience in litigation matters and ability to draft objections and build solid arguments;- 7 – 10 years working experience within globally recognized tax practice;- Previous team management experience;- Demonstrable experience in financial reasoning of client engagements;- Ability to communicate clearly and build strong relationships at all levels internally and externally;- Experience in working with team in remote locations;- Analytical thinking and problem solving;- Digitally enabled- Self-starter with an entrepreneurial spirit.- Excellent English skills (Reading, Speaking and Writing)- Fluent in Arabic (preferred)

    MMJS is a consulting firm that is focused on adding value to its clients business through Tax, Technology and Management Consulting. Strategically located in Bahrain, Oman, UAE, Kuwait and KSA to support clients across GCC.. Having served 300+ clients, MMJS has acquired the trust of many multi-national and Government clients through uncompromising quality of work. MMJS Consulting is a Kreston Menon Group entity which is part of the globally renowned Kreston International group.

    Our VAT leadership and the team consists of experienced, passionate and ambitious staff who have VAT implementation, Advisory, Compliance and VAT Audit experience across various industries in Europe, Middle East, Indian Subcontinent and the Far East. The team is competent to provide an end-to-end solution in relation to VAT in GCC countries. More

  • in

    Data Security & Encryption Services Consultant | IBM Middle East

    Employment:

    Full Time

    Information and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analyzing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client’s organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.Your Role and Responsibilities The Data Protection and Encryption Services Consultant (based in Riyadh, Saudi) is responsible for deploying and supporting the Guardium suite of security products including I BM Guardium Database Activity Monitoring (DAM) and Guardium Data Encryption for IBM customers. The Data Security and Encryption Services Consultant will be a key performer and critical team member in delivering IBM DAM, Encryption and Data Security projects across some of the most exciting clients in Saudi Arabia and the region. The candidate will help implement infrastructure and run long term Encryption and DAM projects and programs that support a holistic Data Security Protection. The candidate should be knowledgeable about how DAM & Encrpytion fits into the broader Security Program and generally understand Data Security concepts around data loss prevention (DLP), tokenization and masking, database activity monitoring, Cloud Access Security Brokers (CASB) and be able to convey security offering capabilities during pursuits. You will help drive a data-centric protection agenda for clients that is tool agnostic, bringing the best that IBM and its strategic partners have to offer around structured data protection to clients. You will be able to apply a consulting approach using knowledge gained from previous roles, experiences and engagements, IBM’s intellectual capital, knowledge of the market/industry, and your own research to address client’s security challenges. This includes working as a team member with client personnel to identify functional and non-functional requirements and subsequently working on the identification, justification and design of the client’s solution. We pride ourselves on being vendor neutral and developing solutions that are the best fit for our customers’ requirements. This means you won’t just work with IBM technology; you will work with technology from of our alliances and other vendors. Are you passionate about keeping current and open to new ideas? To develop your knowledge, along with the cooperative nature of the team, you will be encouraged to constantly learn and improve by visiting industry events and workshops. You will also have access to the global IBM education portal which you are also encouraged to explore as we believe that education and development should not be exclusively security based. Making time to think and explore leads us to develop new ideas and to be better able to help our clients. We are focused on developing talent and industry leading skills. IBM believes in career growth and flexibility. If your desire is to help empower people with unmatched security while working in a supportive and engaging environment, your career and your future will be made with IBM. Projects are based across the Saudi Arabia, often on client premises. The expectation of team members is that they will travel to support clients on site across the region if need arises. All permanent IBM employees have the opportunity to apply to work flexibly under the IBM Flexible Working Policy. Any flexibility is subject to prior management approval in line with business needs. General responsibilities – Create architectural designs that translate into solution requirements – Creating & delivering the solution element of security proposals, this could be administrative, operational or technical – Assisting Sales with responding to requests for proposals and plan the strategy for a given client in responding to client engagements. – Defining and creating a solution that meets the client’s requirements, is deliverable and commercially viable – Understanding the Risk Posture of the client, including their drivers and apatite, legal, regulatory and compliance drivers for the client – Understanding the functional and non-functional requirements of the system – Refining the Security architecture to support the functional design

    Required Technical and Professional Expertise – At least 8-10 years’ experience as Guardium Data Encryption Consultant or DAM Consultant defining and delivering data security solutions in complex multi-technology environments – Proposal & Solution shaping & development – Requirement definition and refinement – Experience Delivering large projects/Architectures for at least two of the following Data Security Technologies: Guardium DAM, Guardium Data Encryption, CASB, DLP, Classification, Data Labeling etc Preferred Technical and Professional Expertise – Stakeholder and scope management – A recognized certification in security appropriate to the role for example: CISSP, CISMP, CompTIA Security +, ITIL qualification etc. – Fluency in English Required and Preferred consulting and technical skills Consulting Skills:- Consider, understand and document client requirements – Effective writing, communication and presentation skills – The ability to work easily with diverse and dynamic teams – Comfortable working in a project based / client serving model – Ability to absorb professional knowledge quickly and develop skills – Ability to work in a matrix management model – Challenge the validity of given procedures and processes with the intent to enhance and improve – Demonstrated analytical skills – Engage with other teams in IBM Security and the wider IBM, to put a value proposition to clients and help win new business; – Deliver agreed pieces of work either as team lead or as part of a team. Technical Skills: – Understanding of concepts involving Encryption/Tokenization, Database Activity Monitoring technologies, Data Loss Prevention (DLP) etc for clients to help address risk and to enhance our clients’ security posture. – Knowledge of and hands-on experience with SQL language, – Knowledge and understanding of relational databases – Excellent understanding of data encryption – Understanding of enterprise authentication and web security – Excellent understanding of the internet protocols TCP/IP, HTTP, SSL/TLS etc. – Experience of public key infrastructure (PKI) – Will have the ability to help architect DAM solutions for customers. – Ability to work with clients to understand requirements and problem-sets and design solutions to address their Data Protection needs and DAM use cases. – Willingness to learn new technology and explore the Data Security product space and assess technology from vendors. – Guardium industry experience is mandatory – Understanding Network and product software security concepts is desirable – Understanding of enterprise application environment architecture is desirable – Experience with Big Data technology and environments is desirable – Experience with cloud environments is desirable – Experienced with database environments such as Oracle, Informix, SQL Server, UDB/DB2, Informix, MySQL, Teradata and/or Sybase is desirable

    For more than six decades, IBM Middle East & Pakistan has played a vital role in shaping the information technology landscape of the region. Today, IBM is part of the region’s technological fabric, solving real-world business and societal challenges, through its offices in UAE, Saudi Arabia, Qatar, Kuwait and Pakistan, and also a diversity of centers across the region.

    Within the region, IBM currently has groundbreaking initiatives in cloud computing, analytics, mobile, security, as well as nanotechnology, eGovernment, healthcare and many more, collaborating with leading educational institutes and governments. IBM supports hundreds of clients to drive transformation through technology, contributes to regional research & development programs and has an active Corporate Service Corps (CSC) program.

    Reinvention is a keyword in the company’s history and, today, IBM is much more than a “hardware, software, services” company. IBM is now emerging as a cognitive solutions and cloud platform company. More

  • in

    Tax Intern | MMJS Consulting

    Employment:

    Full Time

    1. Build strong internal relationships within the Direct and Indirect Tax practice and across other service lines;2. Assisting the team and seniors in Implementation of Direct and Indirect tax in KSA;3. Drafting presentations on Tax matters for the seniors;4. Attitude towards learning and growing in the field of taxation;5. Effective time management to meet the strict deadlines;6. Assisting in interpretation of the Tax law and supporting in the project plans;7. Distinguish yourself by your organization skills, dynamism and motivation to learn and evolve.

    1. Anyone who has completed the under graduation or an ACCA affiliate or CA Finalist2. Eager to apply your accounting knowledge to the field of Tax and become a Tax expert.3. Attention to details.4. Availability to travel within the GCC countries.5. MS Office (MS PowerPoint, MS Word & MS Excel).6. Fluent in English (Reading, Speaking and Writing).7. Fluent in Arabic (Optional).

    MMJS is a consulting firm that is focused on adding value to its clients business through Tax, Technology and Management Consulting. Strategically located in Bahrain, Oman, UAE, Kuwait and KSA to support clients across GCC.. Having served 300+ clients, MMJS has acquired the trust of many multi-national and Government clients through uncompromising quality of work. MMJS Consulting is a Kreston Menon Group entity which is part of the globally renowned Kreston International group.

    Our VAT leadership and the team consists of experienced, passionate and ambitious staff who have VAT implementation, Advisory, Compliance and VAT Audit experience across various industries in Europe, Middle East, Indian Subcontinent and the Far East. The team is competent to provide an end-to-end solution in relation to VAT in GCC countries. More

  • in

    Sales Telecaller – Executive | A Leading Company In UAE

    Employment:

    Full Time

    Our company is urgently looking to recruit experienced Credit Cards & Personal Loans Direct Sales / Telesales Executives at our Dubai Office.

    The ideal candidate will be responsible for building and maintaining a strong sales pipeline. You will do so by identifying key business opportunities and segmented prospects. Your goal will be to meet or exceed our monthly targets and increase our revenue. Salary + Incentive. Visa provide by company.

    A leading company in UAE. More

  • in

    Cyber Ops – Network Security Consultant | Almawarid Group

    Employment:

    Full Time

    Manage the overall endpoint security by detecting, analyzing, monitoring, handling, preventing and reducing the effect of the threats and vulnerabilities to the company networks in line with the current endpoint security technologies. Oversee the overall network security at the company. Identify threats to the company networks or security attack vectors and implement the required network protection measures. Roles: • Evaluate the network security protocols, topologies and device configurations. • Analyze log files related to network traffic, firewalls, IDS, IPS, NAC and DNS. • Identify any suspicious activity and its effect on the data and systems. • Implement and test the firewalls, NAC, IDS and IPS systems• Conduct periodic network security audits. • Implementing the network security policies and procedures. • Conduct risk assessments, employee trainings and network monitoring.• Participate in incident response and business continuity management. • Manage VPN profiles and access. • Perform in-depth analysis of the endpoint security and solutions. • Create and install the required endpoint protections such as anti-virus, firewalls etc. based on the gaps identified in the analysis. • Ensure that end point security solutions are implemented across the systems in the company and identifies inconsistencies. • Identify new attack vectors and requirements for detecting an attack.• Plan, develop and implement feature testing. • Maintain up-to-date signatures on the endpoint security agents.• Develop new signatures and rules at the endpoint security agents to detect cyber threats (i.e. YARA rules, queries) • Develop a blacklist/whitelist of the software list for the company endpoints based on known file hashes and functions. • Maintain compliance with the company policies and other regulatory requirements. • Define the endpoint detection strategy and solutions in coordination with the senior management. • Create and conduct trainings on endpoint security practices for the Company employees.• Identify the list of network devices managed the Cybersecurity Operations function and maintain an updated asset inventory defining the criticality and ownership• Maintain a baseline configuration for the network security assets such as internal/external firewalls, IPS/IDS, NAC systems, anti-DDOS and VPN and test firewall and IDS/IPS logs against forensics requirements. • Define roles and responsibilities for team monitoring Network Admission Control logs.• Develop metrics and KPIs to measure effectiveness of NAC deployment and other network perimeter controls. • Document a process for network devices to align with approved security configurations. • Schedule periodic configuration reviews to ensure network device configurations follow best practices. • Deploy Domain Name System Security Extensions (DNSSEC) across the enterprise. • Deploy and implement a file integrity monitoring tool to be used on a weekly basis. • Implement WIDS and integrate with SIEM to identify rogue wireless devices and detect attacks.• Develop a formal process to centrally manage network firewall operations.• Establish guidelines for encrypting email communications and digitally signing emails and integrate with DLP solution once deployed. • Extend content filtering capabilities to include email and file transfer. • Include DDoS prevention considerations in the enterprise security architecture and secure design processes.

    Knowledge: • Network components, their operation and appropriate network security controls and methods. • Cybersecurity related threats and vulnerabilities. • Cybersecurity authentication, authorization and access control methods.• Vulnerabilities in applications and their likely impact. • Cybersecurity defense and vulnerability assessment tools and their capabilities. • Host and network access control mechanisms. • Sources of information relating to the identification and effective treatment of vulnerabilities. • Best practices for incident response and incident management. • Cybersecurity and privacy principles and organizational requirements. • Programming language structures and logic. • Virtual Private Network (VPN) security.• National cybersecurity regulations and requirements relevant to company. • Cybersecurity policies, procedures and regulations. • Windows and Unix ports and services. • System administration concepts for operating systems used by Company. • Networking and internet communications fundamentals. • Cybersecurity authentication, authorization and access control methods. • Vulnerabilities in applications and their likely impact. • Host and network access control mechanisms. • Best practices for incident response and incident management. • Cybersecurity and privacy principles and organizational requirements. • Programming language structures and logic. • Virtual Private Network (VPN) security. • Cybersecurity policies, procedures and regulations. • Windows and Unix ports and services. • System administration concepts for operating systems used by company. • Networking and internet communications fundamentals.• Analyze infrastructure build sheets, configuration management databases, vulnerability scans, access control lists and vendor documentation to understand software behaviors and interactions.• Use network analysis tools to identify vulnerabilities. • Network tools. • IT security principles and methods. Qualifications: • Bachelor’s degree in computer science, information systems, or related field. • 7-15+ years in an active technical cybersecurity role. • A minimum of 3+ years of related experience in Endpoint Security. • Experience with EDR and/or incident response toolkits preferred. • CISSP, GIAC Penetration Tester, GIAC Security Essentials or equal certifications. • A minimum of 7 years’ experience as a network security specialist • CEH, CCNP Security, CCSP, CCNA, GSEC, GCI, CISSP or equal certifications.• Certified CompTIA, Microsoft, or Cisco network professional preferred. • Technical troubleshooting skills.

    We are a national group formed on the foundations of social responsibility and building the acquired value with hard work and quality of outputs that contribute to creating a fertile production environment for our esteemed customers so that they can present their work in accordance with standards of balanced performance that ensures continuity and reduces the expected risk. More

  • in

    Operational Technology Consultant (OT Infrastructure): | Almawarid Group

    Employment:

    Full Time

    Configure, test and monitor the ICS infrastructure for company. Support with the development and configuration of use cases. Provide subject matter advice on ICS cybersecurity. Roles: • Understand various industrial control systems and their purpose, application, function, and dependencies on network IP and industrial communications. • Work with control network infrastructure design (network architecture concepts, including topology, protocols, and components) and their relation to IEC 62443 and the Purdue Model. • Run Windows and Linux command line tools to analyze the system looking for high-risk items and basic scripting to automate the running of programs to perform continuous monitoring of various tools. • Operating Systems administration (system administration concepts for Unix/Linux and/or Windows operating systems). • Aware of ICS systems’ security lifecycle. • Better understand information assurance principles and tenets (confidentiality, integrity, availability, authentication, non-repudiation). • Support on incident response and handling. • Map different ICS technologies, attacks, and defenses to various cybersecurity standards.• Ensure that the logging and monitoring requirements of OT systems are determined, documented in policies and distributed to stakeholders. • Establish a process for performing real time log- correlation and integration with threat intelligence processes. • Ensure that encryption controls are applied for ICS laptops, removable media, USB drivers.• Monitor the use of approved removable media and ensure that unauthorized removal of media is detected and media related incidents are recorded, analysed and tracked. • Ensure that network defense controls are implemented on external network gateways and access points. • Ensure that web proxy are implemented to limit connections and access to websites. • Manage the network firewall operations through a centralized firewall rule/ request and approval process. • Establish a DMZ and install the firewalls between the DMZ and internal networks.• Ensure that network security scans are conducted in order to detect rogue devices. • Integrate the NAC solution with enterprise tools/ capabilities such as SIEM, DLP, network forensics and malware protection. • Review and update the NAC rules periodically. • Integrate the wireless network access points with IDS/IPS and NAC. • Configure wireless access on ICS machines to allow access to only authorized wireless networks.

    Knowledge: • Network components, their operation and appropriate network security controls and methods. • Knowledge and understanding of risk assessment, mitigation and management methods. • Appropriate data backup and recovery methods and solutions, including testing.• Best practices for incident response and incident management. • Best practice network traffic analysis methods. • Network traffic protocols, methods and management. • Industry standard systems diagnostic tools and fault identification techniques. • The components of a network attack and their relationship to threats and vulnerabilities• Network security architecture concepts including topology, protocols, components, and principles. • Windows and Unix ports and services. • Intrusion detection and prevention system tools and applications. • Network protocols and directory services. • Software related IT security principles and methods. • Basic system, network and OS hardening techniques. • Test procedures, principles and methodologies relevant to developing and integrating cybersecurity capability. • Transmission technologies and jamming techniques that enable and prevent transmission of undesirable information or prevent installed systems from operating correctly and the laws relating to their usage. • Network traffic analysis tools, methodologies and processes. • Web filtering technologies. • Network technologies in IT and ICS/OT environments. • Supervisory control and data acquisition system components. • ICS operating environments and functions. • ICS network architectures and communication protocols. • ICS devices and industrial programming languages. • ICS threat landscape. • threats and vulnerabilities in ICS systems and environments.• intrusion detection methodologies and techniques for detecting ICS intrusions. Qualifications: • Bachelor’s degree in computer science, information technology, or any other engineering field. • 7-15+ years of experience with industrial control systems. • ICS410: ICS/SCADA Security Essentials. • ICS456: Essentials for NERC Critical Infrastructure Protection. • ICS515: ICS Active Defense and Incident Response.• ICS612: ICS Cybersecurity In-Depth. • GICSP, GCIP, GRID

    We are a national group formed on the foundations of social responsibility and building the acquired value with hard work and quality of outputs that contribute to creating a fertile production environment for our esteemed customers so that they can present their work in accordance with standards of balanced performance that ensures continuity and reduces the expected risk. More

  • in

    Data Security protection, classification, and encryption Consultant: | Almawarid Group

    Employment:

    Full Time

    Identify and implement data protection controls and technologies to ensure the protection of the Company information. The consultant is responsible for ensuring the protection of confidential information to authorized personnel by implementing cryptographic controls. He/she evaluates the current cryptographic algorithms and encryption systems and develops new algorithms if required.Role: • Assess the effectiveness of the current data protection controls• Identify and implement mitigation controls / plans for the identified gaps• Assess the practices regarding data collection and data sharing . • Identify, design and implement data protection technologies such as DLP and DRM. • Implement data classification tools and data discovery tools. • Analyze and evaluate the data privacy incidents and report to the concerned team for response and remediation• Ensure the Company compliance with the data protection laws and regulations. Provide recommendations to improve the data protection compliance. • Create security systems / mechanisms that protect against any potential information disclosure or attacks. • Implement security controls to ensure the protection of data from any modification or deletion due to unauthorized access. • Implement new cryptographic algorithms. • Analyze existing encryption systems and cryptographic algorithms to identify weaknesses and vulnerabilities.• Suggest security solutions to eliminate the weaknesses. • Manage, and monitor the implementation of the recommended improvements. • Assist in solving any security issues that may emerge. • Review and analyze all the security incidents to identify the need for cryptographic controls.• Keep up to date with current research and trends for cryptography. • Develop policies, procedures and processes related to privacy and data protection.• Conduct a risk assessment to ensure that appropriate controls are in place to mitigate risk effectively. • Identify and implement technical measures for data protection in line with relevant laws and regulations. • Conduct Privacy Impact Assessments. • Ensure that all third-party services are compliant with data privacy and security requirements.• Liaise with the legal team to ensure the right contractual clauses are defined and embedded into all data processor contracts. • Monitor compliance with GDPR or other applicable data protection laws. • Identify and evaluate the Company data processing activities. • Maintain the records of data processing activities. • Stay updated about the changes in laws and provide recommendations to ensure data privacy compliance.• Act as point of contact with legal and regulatory authorities, and internal teams. • Develop training materials and conducts trainings for employees on best data privacy practices, privacy compliance and the consequences in case of non-compliance

    Knowledge: • Network components, their operation and appropriate network security controls and methods. • Understanding of risk assessment, mitigation and management methods. • Relevant cybersecurity aspects of legislative and regulatory requirements, relating to ethics and privacy. • Computer algorithms. • Cybersecurity considerations for database systems. • Installation, integration and optimization of system components. • Human-computer interaction principles. • IT security principles and methods. • Network access, identity and access management. • Operating systems. • Network traffic protocols, methods and management. • Telecommunications concepts relevant to role. • Network security architecture concepts including topology, protocols, components, and principles. • Network systems management principles, models, methods and tools.• Systems security testing and evaluation methods. • How threat intelligence sources collect intelligence. • Network protocols and directory services. • How to use network analysis tools to identify vulnerabilities. • Intrusion detection and prevention system tools and applications. • Network protocols and directory services• Knowledge and understanding of new technologies and solutions from a cybersecurity perspective. • Network components, their operation and appropriate network security controls and methods. • Cybersecurity authentication, authorization and access control methods. • Encryption algorithms, their relative strengths and weaknesses and appropriate selection criteria. • Cryptography and cryptographic key management concepts.• Cybersecurity assessment and authorization processes. • Cybersecurity controls and privacy requirements for the management of risks relating to data. • Low-level computer languages required for role. • Mathematics required for role. • Programming language structures and logic. • Key security management concepts. • National cybersecurity regulations and requirements relevant to the Company. • Encryption methodologies. • Industry standard security models and their effective application. • Confidentiality, integrity and availability requirements.• Knowledge of current and emerging data encryption security features in databases.• Complex data structures. • Implementing enterprise key escrow systems to support data-at-rest encryption.• Confidentiality, integrity and availability principles. • Asset availability, capabilities and limitations. • NCA ECC Standard. • NIST CSF Framework. • The principles of cybersecurity and data privacy.• Data classification standards and methodologies. • Operational impact on an organization due to cybersecurity breaches. • Relevant cybersecurity, ethics and privacy laws, regulations and standards. • Conducting privacy impact assessments. • Privacy enhancing technologies. • Digital evidence seizes and preservation. Qualifications: • Bachelor’s degree in computer science, information technology, or any other related field. • 7-15 years of experience in information security. • A minimum of 5 years of Data Protection or Data Privacy. • Experience conducting audits to ISO 27701, GDPR and HIPAA • CISA, CISM, IAPP, CIPP, or equivalent certifications. • ECES, CISSP, SANS Suite, or equal certifications

    We are a national group formed on the foundations of social responsibility and building the acquired value with hard work and quality of outputs that contribute to creating a fertile production environment for our esteemed customers so that they can present their work in accordance with standards of balanced performance that ensures continuity and reduces the expected risk. More