IT Security Specialist

مصر - Egypt

 Position Title: IT Security Specialist
• Education :Bachelor degree in Engineering, Computer Science, Information Systems.
• Experience: 2 to 4 years of experience in a similar field Bachelor degree in Engineering, Computer Science, Information Systems or Business Administration
• Reporting to:- Information Security Team Leader
• Languages: Very Good knowledge of English language (speaking, reading and writing).
• Company’s type: Multinational Co.
• Location work : Head Office Cairo 9:00AM am: 5:00pm + 2days off
Technical Courses
• CEH :Certified Ethical Hacker
• MCSA: Windows Server
• MCSA: Office 365
• MS: Implementing Microsoft Azure Infrastructure Solutions
• IT For Business success certificate "HP course
• Cisco Certified Network Associate (CCNA).
• LTE advanced course in JELECOM with general grade: Excellent
• CDMA & UMTS advanced course in JELECOM with general grade: Excellent
• GSM & GPRS & EDGE course in JELECOM with general grade: very good
• Microcontroller advanced course in JELECOM with general grade: very good
• Digital and analog electronics advanced course in JELECOM
Job Description
1. Provide 1st line support on monitoring and maintaining physical environment containing Data center, fire alarm, air conditions.
2. Monitoring Network devices, Leased lines, System and Database alerts.
3. Report daily activities and events on the monitored systems.
4. Handle problems with 3rd parties and open tickets with ISPs.
5. Follow diagrams and action plans to detect/resolve problems.
6. Escalate complex problems to 2nd line support teams and apply their advised corrective actions during their non-working hours.
7. Install and configure computer systems within agreed policies/procedures, diagnose hardware/software, Operating system, applications and network faults.
8. Deploy operating system updates and security.
9. Resolve and correct problems, incidents and providing resolution either over the phone, face to face, or via remote support in a timely and efficient manner or escalating if necessary to the appropriate team then following up incidents and closing request after make sure satisfying the affected staff.
10. Provide 1st line support on monitoring and maintaining network connection between Company and all clients.
11. Provide 1st line support to users with respond to inquiries related to application problems, recording incidents, providing resolution
12. Provide clients with updates, status reports, and information via Ticketing system, email, or phone. •Generate daily reports for open cases to ensure following them up.
13. Incidents Management (incident handling, response and investigation) • Vulnerabilities Management.
14. Keep abreast of the latest threats and practices to address security exposures
15. Strong understanding of Nessus , Nmap , network sniffers other common assessment & penetration testing tools
16. Participate In Penetration Testing
17. Participate in the risk management • Information Security Audits
18. Applying Information Security Policies.
19. Reviewing Administrators Log Reports
20. Participate in the information security awareness program
21. Prepare ISMS KPIs
22. participate in Datacenter design of hacienda Bay (e-compound)
23. participate in the implementation of the Datacenter
24. monitor the network traffic
25. implement VOIP solution (Elastix)
26. digamous network problem
27. Protects system by defining access privileges, control structures, and resources.
28. • Recognizes problems by identifying abnormalities; reporting violations.
29. • Policy gap assessment and follow up on remediating actions with Asset or business line owners.
30. • Determines security violations and inefficiencies by conducting periodic business audits & Assessment.
31. • Define data safeguarding solutions to bank Business solutions existing and new initiatives.
32. • Work on information security awareness program implementation and monitoring
33. • Maintains technical knowledge by attending educational workshops; reviewing publications.
34. • Contributes to team effort by accomplishing related results as needed.
35. • Analysis of periodic key performance indicators for the information security program.
36. • Handling of access governance and requests
If you are interested in this position, please email us your updated CV(with photo attach page word), 

تاريخ النشر: ١٤ فبراير ٢٠١٦
الناشر: Tanqeeb.com

تاريخ النشر: ١٤ فبراير ٢٠١٦
الناشر: Tanqeeb.com