More jobs:
Job Description & How to Apply Below
Job Purpose
Support the Lead of Cyber Security in developing and communicating Corporate Information Security Policies and Procedures. Conduct business risk and vulnerability assessments for Qatar Energy LNG Information Systems and provides authoritative advice and guidance on security strategies to manage identified risks and ensures adoption, and adherence to, Qatar Energy LNG Information Security Policies and Procedures.
Key Job Accountabilities - I- Investigate security breaches in accordance with established procedures and security standards and recommend required actions and support/ follow up to ensure these are implemented. Investigate and reconcile violation reports and logs generated by automated systems.
- Provide guidance and assistance in defining access rights and privileges. Operate and administer both physical and logical access controls used to provide continuous and secure access to information services.
- Conduct security control reviews in well-defined areas. Assess security of information and infrastructure components. Investigate and assesses risks of network attacks and recommend remedial action.
- Conduct business risk and vulnerability assessments and business impact analysis for medium complexity information systems.
- Review compliance with information security policies and standards and assess configurations and security procedures for adherence to legal and regulatory requirements.
- Assess the implications of any unacceptable usage and breaches of privileges or corporate policy and recommend appropriate action.
- Provide advice and guidance on the application and operation of elementary physical, procedural, and technical security controls and communicate information assurance risks and requirements effectively to users of systems and networks.
- Investigate suspected attacks and undertakes the investigation and resolution of security incidents, in accordance with established procedures including incident management procedures.
- Deliver elements of the security components of system architectures.
- Investigate causes of incidents and seek resolution.
- Bachelor s degree in Computer Science, Information Technology, Information Systems.
- 8 years' Information Security experience.
- Conversant with relevant Information Security national and international standards.
- Experience in accordance with relevant IT competency frameworks.
- Good working knowledge of Information Security coupled with equivalent knowledge of the activities of those businesses and other organizations that employ IT.
- Understanding of the principles and practices involved in development and maintenance of Information Security requirements.
Position Requirements
10+ Years
work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×