More stories

  • in

    Senior Legal Consultant (Bilingual) | Deloitte & Touche (M.E.)

    Employment:

    Full Time

    We are looking for an Arabic Speaking senior qualified attorney/lawyer/solicitor (preferably admitted) to join at an Senior Consultant level in the Quality and Risk Management (QRM) team in the capacity of a Senior Legal Advisor in the Risk Advisory Business line, reporting to the Risk Advisory Risk Lead and indirectly to the Business Risk Leader.Responsibilities:Legal:- Primary reviewer for all Arabic contracts and legal documents;- Review ongoing projects on any lifecycle – legal, reputational or other risks,- Liaise with relevant leadership, functions or industries to ensure that legal risk has been identified, and recommend actions or safeguards to be implemented;- Provide legal and legal risk management advice on contract management, contracting risk and deal structuring;- Formulate legal opinion and disseminate as communication;- Interpretation and advice on legal documentation.Contract Negotiation:- Manage contractual landscape end to end from Opportunity until close-out of Engagement;- Assess legal implications of various opportunities and implementation for Engagements;- Prepare, review and modify contractual mediums to assist and support various delivery activities;- Negotiate, review and draft commercial legal documentation for business transactions.Contract Management:- Review, edit and negotiate Change Orders and Amendments to the Services Agreement;- Review, edit and negotiate basic contracts and other transactional documents (e.g. SOWs, NDAs, Change Orders, and Amendments) throughout the continuance of the Engagement;- Liaise with the Engagement management team, Quality Risk Assurance and internal Legal;- Interpret expectations, obligations, assumptions and provide a business analysis for consideration, and coordinate and document change;- Communicate expectations and standards with key stakeholders;- Protect interests, property, confidential information and marks;- Communicate and summarize contract and business deal proposition to present to leadership.Service and Product Risk Management:- Deep understanding of the different service and product offerings delivered in the Engagement together with their inherent risks;- Classifying, evaluating, and monitoring risks, and implementing mitigations for the risks identified.

    – Admitted Attorney / Solicitor / Barrister;- 4-6 years post qualification experience in reviewing Arabic & English documents (Contracts – Agreements) .- Experience in a reputable Legal Practice;- Prior Consulting experience preferential (other Big 4);- Arabic speaker is a MUST- the candidate should be able to fluently read and review Arabic and English legal documents.

    Deloitte is the world’s largest and leading professional services firm, providing audit & assurance, consulting, financial advisory, risk advisory and tax and services to public and private clients spanning multiple industries, whether they are in the energy, communications, oil and gas, financial services, family businesses, healthcare, public or education sectors among others.

    With a globally connected network of member firms in more than 150 countries and territories, Deloitte brings world-class capabilities and high-quality service to clients, delivering the insights they need to address their most complex business challenges. Deloitte’s more than 250,000 professionals are committed to becoming the standard of excellence.

    Deloitte & Touche (M.E.) is a member firm of Deloitte globally and is the first Arab professional services firm established in the Middle East region Deloitte & Touche (M.E.) is a member firm of Deloitte Touche Tohmatsu Limited (DTTL) and is a leading professional services firm established in the Middle East region with uninterrupted presence since 1926 with 26 offices in 15 countries to date. What distinguishes Deloitte member firms in the Middle East is the global and regional expertise and know-how offered through specialized and highly knowledgeable talent. Deloitte aims to offer the best services to its clients through a team with more than 3,300 partners, directors and staff in the Middle East which guarantees effective communication with clients and a deeper understanding of their needs. It is a Tier 1 Tax advisor in the GCC region since 2010 (according to the International Tax Review World Tax Rankings). It has also received numerous awards in the last few years which include best employer in the Middle East, best consulting firm, the Middle East Training & Development Excellence Award by the Institute of Chartered Accountants in England and Wales (ICAEW), as well as the best CSR integrated organization.

    Deloitte drives progress. Our practices around the Middle East support clients become leaders wherever they choose to compete. We invest in outstanding people of diverse talents and backgrounds and empower them to achieve more than they could elsewhere. Our work combines advice with action and integrity. We believe that when our clients and society are stronger, so are we.

    Our Purpose

    Deloitte makes an impact that matters. Every day we challenge ourselves to do what matters most-for clients, for our people, and for society. We serve clients distinctively, bringing innovative insights, solving complex challenges and unlocking sustainable growth. We inspire our talented professionals to deliver outstanding value to clients, providing an exceptional career experience and an inclusive and collaborative culture. We contribute to society, building confidence and trust in the markets, upholding the integrity of organizations and supporting our communities.

    Our shared values guide the way we behave to make a positive, enduring impact:

    Integrity
    Outstanding value to markets and clients
    Commitment to each other
    Strength from cultural diversity More

  • in

    Data Security & Encryption Services Consultant | IBM Middle East

    Employment:

    Full Time

    Information and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analyzing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client’s organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.Your Role and Responsibilities The Data Protection and Encryption Services Consultant (based in Riyadh, Saudi) is responsible for deploying and supporting the Guardium suite of security products including I BM Guardium Database Activity Monitoring (DAM) and Guardium Data Encryption for IBM customers. The Data Security and Encryption Services Consultant will be a key performer and critical team member in delivering IBM DAM, Encryption and Data Security projects across some of the most exciting clients in Saudi Arabia and the region. The candidate will help implement infrastructure and run long term Encryption and DAM projects and programs that support a holistic Data Security Protection. The candidate should be knowledgeable about how DAM & Encrpytion fits into the broader Security Program and generally understand Data Security concepts around data loss prevention (DLP), tokenization and masking, database activity monitoring, Cloud Access Security Brokers (CASB) and be able to convey security offering capabilities during pursuits. You will help drive a data-centric protection agenda for clients that is tool agnostic, bringing the best that IBM and its strategic partners have to offer around structured data protection to clients. You will be able to apply a consulting approach using knowledge gained from previous roles, experiences and engagements, IBM’s intellectual capital, knowledge of the market/industry, and your own research to address client’s security challenges. This includes working as a team member with client personnel to identify functional and non-functional requirements and subsequently working on the identification, justification and design of the client’s solution. We pride ourselves on being vendor neutral and developing solutions that are the best fit for our customers’ requirements. This means you won’t just work with IBM technology; you will work with technology from of our alliances and other vendors. Are you passionate about keeping current and open to new ideas? To develop your knowledge, along with the cooperative nature of the team, you will be encouraged to constantly learn and improve by visiting industry events and workshops. You will also have access to the global IBM education portal which you are also encouraged to explore as we believe that education and development should not be exclusively security based. Making time to think and explore leads us to develop new ideas and to be better able to help our clients. We are focused on developing talent and industry leading skills. IBM believes in career growth and flexibility. If your desire is to help empower people with unmatched security while working in a supportive and engaging environment, your career and your future will be made with IBM. Projects are based across the Saudi Arabia, often on client premises. The expectation of team members is that they will travel to support clients on site across the region if need arises. All permanent IBM employees have the opportunity to apply to work flexibly under the IBM Flexible Working Policy. Any flexibility is subject to prior management approval in line with business needs. General responsibilities – Create architectural designs that translate into solution requirements – Creating & delivering the solution element of security proposals, this could be administrative, operational or technical – Assisting Sales with responding to requests for proposals and plan the strategy for a given client in responding to client engagements. – Defining and creating a solution that meets the client’s requirements, is deliverable and commercially viable – Understanding the Risk Posture of the client, including their drivers and apatite, legal, regulatory and compliance drivers for the client – Understanding the functional and non-functional requirements of the system – Refining the Security architecture to support the functional design

    Required Technical and Professional Expertise – At least 8-10 years’ experience as Guardium Data Encryption Consultant or DAM Consultant defining and delivering data security solutions in complex multi-technology environments – Proposal & Solution shaping & development – Requirement definition and refinement – Experience Delivering large projects/Architectures for at least two of the following Data Security Technologies: Guardium DAM, Guardium Data Encryption, CASB, DLP, Classification, Data Labeling etc Preferred Technical and Professional Expertise – Stakeholder and scope management – A recognized certification in security appropriate to the role for example: CISSP, CISMP, CompTIA Security +, ITIL qualification etc. – Fluency in English Required and Preferred consulting and technical skills Consulting Skills:- Consider, understand and document client requirements – Effective writing, communication and presentation skills – The ability to work easily with diverse and dynamic teams – Comfortable working in a project based / client serving model – Ability to absorb professional knowledge quickly and develop skills – Ability to work in a matrix management model – Challenge the validity of given procedures and processes with the intent to enhance and improve – Demonstrated analytical skills – Engage with other teams in IBM Security and the wider IBM, to put a value proposition to clients and help win new business; – Deliver agreed pieces of work either as team lead or as part of a team. Technical Skills: – Understanding of concepts involving Encryption/Tokenization, Database Activity Monitoring technologies, Data Loss Prevention (DLP) etc for clients to help address risk and to enhance our clients’ security posture. – Knowledge of and hands-on experience with SQL language, – Knowledge and understanding of relational databases – Excellent understanding of data encryption – Understanding of enterprise authentication and web security – Excellent understanding of the internet protocols TCP/IP, HTTP, SSL/TLS etc. – Experience of public key infrastructure (PKI) – Will have the ability to help architect DAM solutions for customers. – Ability to work with clients to understand requirements and problem-sets and design solutions to address their Data Protection needs and DAM use cases. – Willingness to learn new technology and explore the Data Security product space and assess technology from vendors. – Guardium industry experience is mandatory – Understanding Network and product software security concepts is desirable – Understanding of enterprise application environment architecture is desirable – Experience with Big Data technology and environments is desirable – Experience with cloud environments is desirable – Experienced with database environments such as Oracle, Informix, SQL Server, UDB/DB2, Informix, MySQL, Teradata and/or Sybase is desirable

    For more than six decades, IBM Middle East & Pakistan has played a vital role in shaping the information technology landscape of the region. Today, IBM is part of the region’s technological fabric, solving real-world business and societal challenges, through its offices in UAE, Saudi Arabia, Qatar, Kuwait and Pakistan, and also a diversity of centers across the region.

    Within the region, IBM currently has groundbreaking initiatives in cloud computing, analytics, mobile, security, as well as nanotechnology, eGovernment, healthcare and many more, collaborating with leading educational institutes and governments. IBM supports hundreds of clients to drive transformation through technology, contributes to regional research & development programs and has an active Corporate Service Corps (CSC) program.

    Reinvention is a keyword in the company’s history and, today, IBM is much more than a “hardware, software, services” company. IBM is now emerging as a cognitive solutions and cloud platform company. More

  • in

    Tax Intern | MMJS Consulting

    Employment:

    Full Time

    1. Build strong internal relationships within the Direct and Indirect Tax practice and across other service lines;2. Assisting the team and seniors in Implementation of Direct and Indirect tax in KSA;3. Drafting presentations on Tax matters for the seniors;4. Attitude towards learning and growing in the field of taxation;5. Effective time management to meet the strict deadlines;6. Assisting in interpretation of the Tax law and supporting in the project plans;7. Distinguish yourself by your organization skills, dynamism and motivation to learn and evolve.

    1. Anyone who has completed the under graduation or an ACCA affiliate or CA Finalist2. Eager to apply your accounting knowledge to the field of Tax and become a Tax expert.3. Attention to details.4. Availability to travel within the GCC countries.5. MS Office (MS PowerPoint, MS Word & MS Excel).6. Fluent in English (Reading, Speaking and Writing).7. Fluent in Arabic (Optional).

    MMJS is a consulting firm that is focused on adding value to its clients business through Tax, Technology and Management Consulting. Strategically located in Bahrain, Oman, UAE, Kuwait and KSA to support clients across GCC.. Having served 300+ clients, MMJS has acquired the trust of many multi-national and Government clients through uncompromising quality of work. MMJS Consulting is a Kreston Menon Group entity which is part of the globally renowned Kreston International group.

    Our VAT leadership and the team consists of experienced, passionate and ambitious staff who have VAT implementation, Advisory, Compliance and VAT Audit experience across various industries in Europe, Middle East, Indian Subcontinent and the Far East. The team is competent to provide an end-to-end solution in relation to VAT in GCC countries. More

  • in

    Senior Manager – Tax | MMJS Consulting

    Employment:

    Full Time

    – Ensure that the team renders a quality tax services to businesses.- Carryout research on new tax laws and trends.- Drafting Articles and updates to clients from time to time.- Proactively manage a portfolio of clients and report into Director and above.- Ability to review and sign off on KSA tax/zakat returns, tax/zakat advisory, and related objections.- Be involved in the financial management of clients.- Be actively involved in business development activities to help identify and research opportunities on new/existing clients.- Build client relationships with new and existing clients.- Contribute to the development of your own and team’s technical acumen.- Develop strategies to solve complex technical challenges.- Assist in the management and delivering of large projects.- Train, coach, and supervise staff.

    – Experience in business development and growing client relationships and revenue;- KSA Income tax expertise and managing tax compliance for client engagements;- Ability to provide ad hoc KSA tax consulting advice to inbound or outbound KSA clients;- Experience in litigation matters and ability to draft objections and build solid arguments;- 7 – 10 years working experience within globally recognized tax practice;- Previous team management experience;- Demonstrable experience in financial reasoning of client engagements;- Ability to communicate clearly and build strong relationships at all levels internally and externally;- Experience in working with team in remote locations;- Analytical thinking and problem solving;- Digitally enabled- Self-starter with an entrepreneurial spirit.- Excellent English skills (Reading, Speaking and Writing)- Fluent in Arabic (preferred)

    MMJS is a consulting firm that is focused on adding value to its clients business through Tax, Technology and Management Consulting. Strategically located in Bahrain, Oman, UAE, Kuwait and KSA to support clients across GCC.. Having served 300+ clients, MMJS has acquired the trust of many multi-national and Government clients through uncompromising quality of work. MMJS Consulting is a Kreston Menon Group entity which is part of the globally renowned Kreston International group.

    Our VAT leadership and the team consists of experienced, passionate and ambitious staff who have VAT implementation, Advisory, Compliance and VAT Audit experience across various industries in Europe, Middle East, Indian Subcontinent and the Far East. The team is competent to provide an end-to-end solution in relation to VAT in GCC countries. More

  • in

    Data Security protection, classification, and encryption Consultant: | Almawarid Group

    Employment:

    Full Time

    Identify and implement data protection controls and technologies to ensure the protection of the Company information. The consultant is responsible for ensuring the protection of confidential information to authorized personnel by implementing cryptographic controls. He/she evaluates the current cryptographic algorithms and encryption systems and develops new algorithms if required.Role: • Assess the effectiveness of the current data protection controls• Identify and implement mitigation controls / plans for the identified gaps• Assess the practices regarding data collection and data sharing . • Identify, design and implement data protection technologies such as DLP and DRM. • Implement data classification tools and data discovery tools. • Analyze and evaluate the data privacy incidents and report to the concerned team for response and remediation• Ensure the Company compliance with the data protection laws and regulations. Provide recommendations to improve the data protection compliance. • Create security systems / mechanisms that protect against any potential information disclosure or attacks. • Implement security controls to ensure the protection of data from any modification or deletion due to unauthorized access. • Implement new cryptographic algorithms. • Analyze existing encryption systems and cryptographic algorithms to identify weaknesses and vulnerabilities.• Suggest security solutions to eliminate the weaknesses. • Manage, and monitor the implementation of the recommended improvements. • Assist in solving any security issues that may emerge. • Review and analyze all the security incidents to identify the need for cryptographic controls.• Keep up to date with current research and trends for cryptography. • Develop policies, procedures and processes related to privacy and data protection.• Conduct a risk assessment to ensure that appropriate controls are in place to mitigate risk effectively. • Identify and implement technical measures for data protection in line with relevant laws and regulations. • Conduct Privacy Impact Assessments. • Ensure that all third-party services are compliant with data privacy and security requirements.• Liaise with the legal team to ensure the right contractual clauses are defined and embedded into all data processor contracts. • Monitor compliance with GDPR or other applicable data protection laws. • Identify and evaluate the Company data processing activities. • Maintain the records of data processing activities. • Stay updated about the changes in laws and provide recommendations to ensure data privacy compliance.• Act as point of contact with legal and regulatory authorities, and internal teams. • Develop training materials and conducts trainings for employees on best data privacy practices, privacy compliance and the consequences in case of non-compliance

    Knowledge: • Network components, their operation and appropriate network security controls and methods. • Understanding of risk assessment, mitigation and management methods. • Relevant cybersecurity aspects of legislative and regulatory requirements, relating to ethics and privacy. • Computer algorithms. • Cybersecurity considerations for database systems. • Installation, integration and optimization of system components. • Human-computer interaction principles. • IT security principles and methods. • Network access, identity and access management. • Operating systems. • Network traffic protocols, methods and management. • Telecommunications concepts relevant to role. • Network security architecture concepts including topology, protocols, components, and principles. • Network systems management principles, models, methods and tools.• Systems security testing and evaluation methods. • How threat intelligence sources collect intelligence. • Network protocols and directory services. • How to use network analysis tools to identify vulnerabilities. • Intrusion detection and prevention system tools and applications. • Network protocols and directory services• Knowledge and understanding of new technologies and solutions from a cybersecurity perspective. • Network components, their operation and appropriate network security controls and methods. • Cybersecurity authentication, authorization and access control methods. • Encryption algorithms, their relative strengths and weaknesses and appropriate selection criteria. • Cryptography and cryptographic key management concepts.• Cybersecurity assessment and authorization processes. • Cybersecurity controls and privacy requirements for the management of risks relating to data. • Low-level computer languages required for role. • Mathematics required for role. • Programming language structures and logic. • Key security management concepts. • National cybersecurity regulations and requirements relevant to the Company. • Encryption methodologies. • Industry standard security models and their effective application. • Confidentiality, integrity and availability requirements.• Knowledge of current and emerging data encryption security features in databases.• Complex data structures. • Implementing enterprise key escrow systems to support data-at-rest encryption.• Confidentiality, integrity and availability principles. • Asset availability, capabilities and limitations. • NCA ECC Standard. • NIST CSF Framework. • The principles of cybersecurity and data privacy.• Data classification standards and methodologies. • Operational impact on an organization due to cybersecurity breaches. • Relevant cybersecurity, ethics and privacy laws, regulations and standards. • Conducting privacy impact assessments. • Privacy enhancing technologies. • Digital evidence seizes and preservation. Qualifications: • Bachelor’s degree in computer science, information technology, or any other related field. • 7-15 years of experience in information security. • A minimum of 5 years of Data Protection or Data Privacy. • Experience conducting audits to ISO 27701, GDPR and HIPAA • CISA, CISM, IAPP, CIPP, or equivalent certifications. • ECES, CISSP, SANS Suite, or equal certifications

    We are a national group formed on the foundations of social responsibility and building the acquired value with hard work and quality of outputs that contribute to creating a fertile production environment for our esteemed customers so that they can present their work in accordance with standards of balanced performance that ensures continuity and reduces the expected risk. More

  • in

    Cyber Governance – Cloud Security Consultant: | Almawarid Group

    Employment:

    Full Time

    Design, deploy and manage the solutions in the cloud environment. Provide guidance on cloud security to identify, detect, analyze and mitigate any threats or vulnerabilities. • Design and develop the cloud security architecture. • Develop and maintain a reference cloud security architecture.• Evaluate the effectiveness of current security architectures and designs with the IT team• Conduct cloud security risk assessments. • Develop and implement secure cloud strategy, policies and procedures. • Identify the company data stored within cloud environments. • Act as a subject matter expert for security cloud architecture. • Build and implement security controls to prevent unauthorized access to, alteration and disclosure of cloud data, software and systems. • Test software systems to ensure the security of the cloud-based platforms. • Assist the Intelligence team in monitoring and responding to cloud security events and incidents. • Develop and conduct awareness sessions on the cloud security.

    Knowledge:• NCA ECC Standard. • NIST CSF Framework.• The principles of cybersecurity and privacy.• Cloud-based knowledge management technologies and concepts. • Cloud service models and effect on incident response. • Cybersecurity incident response in cloud environment. • Network components, security measures and methods. • Cross-platform collaboration and content synchronization. • Virtualization technologies. • Network Infrastructure cybersecurity communication methods, principles and concepts. • IT security solutions (e.g. SIEM, CASB, DLP, MFA etc.) • Cloud security alliance cloud controls matrix • Relevant cybersecurity, ethics and privacy laws, regulations and standardsQualifications: • Bachelor’s degree in computer science, information systems, software engineering, data science, or related field. • 7- 15 years of experience in information security. • 7+ years of experience in cloud security. • Experience working with standard concepts, practices, and procedures of cloud technology and public cloud environments. • CISSP, CISM, CISA, CCSP, CCSK, CompTIA Cloud+, AWS cloud certifications, Azure cloud certification or equal certifications

    We are a national group formed on the foundations of social responsibility and building the acquired value with hard work and quality of outputs that contribute to creating a fertile production environment for our esteemed customers so that they can present their work in accordance with standards of balanced performance that ensures continuity and reduces the expected risk. More

  • in

    Application security Consultant: | Almawarid Group

    Employment:

    Full Time

    The systems security development specialist is responsible for evaluating the security of the software and applications. He/she should be involved in the complete software development lifecycle.• Determine the required security controls. • Assist in software design reviews. • Identify functional and/or performance test cases. • Conduct a risk assessment when a system, software or application undergoes a change. • Conduct secure code reviews. • Identify and implement security mechanisms to resolve issues in software development. • Perform software quality assurance testing. • Implement security measures for solving issues identified during software acceptance phase. • Conduct vulnerability assessment activities prior to deploying the application. • Evaluate and communicate the software testing results with the design team and stakeholders. • Develop documentation for software programming and development, and secure software / system testing and validation. • Develop and implement an application security program across the organization with periodic reviews to assess effectiveness. • Develop secure coding standards and procedures, derived from leading security practices and industry standards, across all platforms. • Develop a process for project risk rating to drive and inform SDLC rigor (e.g. threat modelling), which will be part of the SDLC process. • Conduct security assessments on applications when in staging mode and provide risk assessment report for application owners before deploying them in production.• Define an IT/OT application testing framework where regular reviews and mandatory checkpoints are conducted against defined standards prior to design completion.• Develop a code integrity process where code signing is performed consistently & integrated in SDLC process and code obfuscation is applied wherever applicable. • Conduct security assessments on applications in production. • Review the IT/OT security controls for applications targeted with cyber threats. • Maintain a centralized repository for SDLC processes integrated with regular tracking processes. • Document a list of requirements where all intellectual property and production code are held in escrow. • Develop guidelines to include application security testing and for mobile applications.• Train testers on coding process using security test cases. • Identify and assign personnel responsible for application security. • Develop a process for conducting SAST and DAST activities on all developed applications• Implement Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) tools to identify vulnerabilities and weaknesses in applications before deploying into production. • Develop a platform to allow users to report bugs/issues in the applications. • Implement a WAF to ensure protection of critical and externally facing the company applications. • Ensure WAF logs are captured, archived and integrated to the SIEM solution. • Create and maintain an inventory of all IT/OT applications including criticality and sensitivity ratings, reviewed at least once a year. • Maintain a whitelist of IT/OT applications and application components authorized to be active on a host along with a list of trusted applications from vendors. • Perform periodic scans to detect deviations from the baseline configuration standards.• Develop schedule to periodically review Web Application Firewall (WAF) signatures based on the changes to application use cases and design changes. • Develop training materials and implement training on application hardening relevant to all stakeholders.

    Knowledge: • Network components, their operation and appropriate network security controls and methods. • Cybersecurity and privacy principles as they apply to software development. • Programming language structures and logic. • Interpreted and compiled computer languages. • Critical information systems that were designed with limited technical cybersecurity controls. • Data security standards relating to the sector in which the company operates. • Embedded systems and how cybersecurity controls can be applied to them. • Intrusion detection and prevention system tools and applications. • Complex data structures. • Local and wide area networking principles and concepts including bandwidth management.• Secure configuration management techniques. • Software debugging principles. • Software development models.• Software engineering. • System design tools, methods and techniques, including automated systems analysis and design tools. • Knowledge of web services. • Secure coding techniques. • Software quality assurance process. • Developing software in high-level languages.• Developing software for UNIX or Linux.Qualifications: • Bachelor’s degree in computer science, information systems, or related field. • 10+ years of experience in information security. • 7+ years of experience in security testing of software. • ISTQB certifications, or equal certifications• Bachelor’s degree in computer science, information systems, or related field. • 10+ years of experience in information security. • 7+ years of experience in security testing of software. • ISTQB certifications, or equal

    We are a national group formed on the foundations of social responsibility and building the acquired value with hard work and quality of outputs that contribute to creating a fertile production environment for our esteemed customers so that they can present their work in accordance with standards of balanced performance that ensures continuity and reduces the expected risk. More

  • in

    Microsoft Infrastructure Consultant | Qatar Datamation Systems (QDS)

    Employment:

    Full Time

    As a Microsoft Infrastructure Consultant, you will be responsible to design and develop the infrastructure technical aspects for the deployment for different customer and also work with Microsoft closely.Description: • Act as the infrastructure expert for supporting different customers in the transformation of various services from on-premises solutions to Cloud technologies.• Plan, design, configure and deploy large scale cloud infrastructure on-premises or on Azure for different customers.• Produce end-to-end solution designs, putting together technologies from multiple IT systems and departments across either the application or infrastructure domains.• Must have detailed knowledge and experience of one or more application or infrastructure domains and can clearly document and communicate the domain architecture.• Ensures technical quality and assurance by participating in Governance and Technical Design peer review processes, working closely with customer and internal stakeholders as appropriate.• Oversees coordination of the Solution Manager/Solution Architect, and teams up with other Functional or Technical Architects.• Experience and working knowledge with Microsoft Azure with IaaS & PaaS / Microsoft 365 with Security, including planning, configuration, optimization and deployment. • Strong practical Windows-based systems administration skills in a Cloud or Virtualized environment. • Proficiency in Windows / Active Directory / Exchange / Azure and Microsoft 365 technologies. • Large scale migration experience Data Centre to Data Centre and/or Data Centre to Cloud. • Demonstrated ability to think strategically about business, product, and technical challenges. • Experience planning and developing support processes and adhering to best practices.• Strong written and oral communication skills, and the ability to effectively communicate with technical and non-technical audiences. • Experience managing cloud/data center operations, including governance, monitoring, alerting and notifications.

    Candidate should have relevant experience of deployment/migration/configuration on the below technologies and platforms:• Active Directory• Exchange Server• Microsoft Azure Cloud (IaaS/PaaS)• Microsoft 365 (Office 365/Enterprise Mobility + Security/Windows 10)• System Center Suite• SQL Server

    QDS has strengthened its play and expanded its presence in the regional IT solutions, services and support market by building long-term relationships with customers and principals.

    Since its inception in 1983, QDS has been growing from strength to strength blending the latest of technology with impeccable business acumen and meeting the most challenging requirements of a fastevolving IT landscape through strategic joint ventures, world class vendor alliances, extensive and strategic vertical focus and a well trained and talented workforce of over 150 professionals.

    Today, QDS provides a wide range of fully integrated IT based business solutions that addresses almost the entire market spectrum, spanning various verticals like Banking and Finance, Healthcare, Government, Education, Oil and Gas, Telecommunication and Private sectors backed by high quality customer Support. More