Dubai jobs vacancies 2020 apply to any qualification and any nation Must have insight around Enterprise Security Architecture Security, Security Strategy and Compliance Consulting Experience making and review of security best practices and execution of security standards over the association, to meet business objectives alongside the client and administrative necessities, Understanding of consistence administrative necessities like and so on., Must have insight around the plan of security controls and item best-fit examination to guarantee a start to finish security covering various zones of security engineering :Layered Security Zoning Integration perspectives API Security Endpoint Security Data Security Compliance and guidelines Threat Intelligence Threat Exposure and Incident Management perspectives  Must Possess solid introduction, composed and verbal relational abilities  Industry Security Certifications like and so forth., are liked Good Understanding and Must have involvement with executing Cloud Security Controls Good Understanding of Cloud Platforms like Azure, Oracle, Google, AWS, and so forth.,
Good Understanding of Dockers, Containers, and Kubernetes Good Understanding of SDN advances like ACI. Good understanding of REST, SOAP Protocols, Web administrations, and so forth., Good Understanding of Symmetric and Asymmetric Cryptography calculations.

 

 

Wanted Candidate Profile

Jobs AND RESPONSIBILITIES

• Gaining a comprehension of our Current State and Target State Architecture and afterward attempting to characterize a system for our specialized course around security.

• Gather and examine necessities from item proprietors.

• Develop Security Architecture for exceptionally adaptable and deficiency open-minded applications that cling to expected principles and order from a security pose.

• Provide specialized and design oversight for frameworks and tasks that are needed to be solid, enormously adaptable, exceptionally accessible (99.999% uptime), and viable.

• Technical aptitude in various controls inside IT Infrastructure and Information Security, including organizing, virtualization, distributed computing, application security, and information bases

• Provide security design and counsel on the side of use security, IT foundation, and endeavor innovation activities to guarantee the honesty of the bank is ensured.

• Assess venture prerequisites identified with application security, IT Infrastructure incorporating connection with bank’s security strategy and guidelines.

• Define, archive, and actualize the infra and security design for the IT ventures including yet not restricted to the accompanying

1. Validation and approval

2. Record organization controls (provisioning, isolation of obligations, approval, authentication, and so on.)

3. Examining of basic security-related occasions

4. Privacy, Integrity, and Availability of the framework and information.

Increasing comprehension of our Current State and Target State Architecture and afterward attempting to characterize a methodology for our specialized bearing around security.

• Gather and break down prerequisites from item proprietors.

• Develop Security Architecture for profoundly versatile and issue open-minded applications that hold fast to expected guidelines and control from a security pose.

• Provide specialized and design oversight for frameworks and activities that are needed to be solid, greatly adaptable, exceptionally accessible (99.999% uptime), and viable.

• Technical aptitude in numerous controls inside IT Infrastructure and Information Security, including organizing, virtualization, distributed computing, application security, and data sets

• Provide security design and counsel on the side of utilization security, IT framework, and undertaking innovation activities to guarantee the respectability of the bank is ensured.

• Assess venture prerequisites identified with application security, IT Infrastructure incorporating relationship with bank’s security strategy and guidelines.

• Define, report, and actualize the infra and security engineering for the IT ventures including yet not restricted to the accompanying

1. Verification and approval

2. Record organization controls (provisioning, isolation of obligations, approval, verification, and so on.)

3. Reviewing of basic security-related occasions

4. Classification, Integrity, and Availability of the framework and information.