Endpoint & Identity Manager
Head Office (EGY44), Egypt
⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️
Al Ahli Bank Of Kuwait
- Participate in Develop Bank strategy to increase Security Maturity Level.
- Manage user identities and access privileges through IAM systems, including provisioning, de-provisioning, and access control.
- Deploy and manage endpoint security tools such as antivirus, anti-malware, endpoint detection and response (EDR), MDM.
- Implement Information Security Programs based on NIST/ISO 27001 security standards overseeing all IT security & compliance initiatives across all business units.
- Lead compliance audits for External audits, Central Bank of Egypt, ABK Kuwait audit.
- Collaborate with Information Security, legal and compliance groups to develop business and technical compliance strategies Develop Periodic Security Health check report for Top management to be aware of any
- Monitor endpoint security and IAM systems for suspicious activity and respond to security incidents.
- Collaborate with IT and security teams to ensure that endpoints and identities are properly secured.
- Stay current on the latest endpoint security threats and vulnerabilities and develop mitigation strategies.
- Conduct vulnerability assessments to identify and mitigate endpoint security risks.
- Coordinate the development, communication and participate in delivering operation security awareness program
- Follow up periodic process of Execute and maintain Vulnerability assessment finding and lead Operations Teams to Cover Execute, maintain and update risk assessment profiles.
- Assess and monitor identity access controls, including end points, servers, and firewall rules to assure that it is defined based on best practices.
- Responsible for micro-segmentation processes.
- Monitor, assess and verify the implementation of IT security baselines within the IT organization.
- Security Knowledge transfer to IT security operation team.
- lead current and future Security Projects within the bank
- Follow up change management process
- Follow up patch management process
- Continually assess the overall effectiveness of the information security program.
- Participate in Incident Management.
- Align with Security Operations Centre “SOC” to implement recommended controls.
- Follow up Security information and event management Process.
Education
- Bachelor’s Degree in Computer Science or Equivalent
- Mandatory: PCI, CCNP Security, Network Security
- Recommended: CISSP, CISM or CISA
Knowledge:
- IT security operations
- Risk Assessment
- Security Assessment
Experience
- At least 8 year’s professional IT experience
- Experience in Information Security Standard “IS0 27xx, PCI”
- Security Architecture review and advise as per security standard
- Security hardening
- Risk assessment and incident handling
- Security Scans and take required actions/controls
- Secure Development cycle for in-house applications.
- maintain Security Operations Center with all required activities.
- Experience with security technologies such as firewalls, intrusion detection/prevention systems, data loss prevention, and encryption.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Antivirus Audits CCNP CISA CISM CISSP Compliance Computer Science EDR Encryption Endpoint security Firewalls IAM Intrusion detection ISO 27001 Malware Network security NIST Risk assessment Security assessment SOC Strategy Vulnerabilities
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.