Similar Jobs

  • Infonas

    Security Operations Specialist

    Manama, CAPITAL GOVERNORATE, Bahrain

    • Ending Soon

    As a Security Operations Specialist at Infonas, you will play a crucial role in identifying, analyzing, and reporting events that occur or might occur within the network. Your primary responsibility will be to use defensive measures and information collected from various sources to protect information, information systems, and networks from potenti

    Job Source: Infonas
  • ChillUP

    App Operation Specialist

    Budaiya, Northern Governorate, Bahrain

    We are seeking a highly organized and detail-oriented App Operations Specialist to join our team. As an App Operations Specialist, you will be responsible for ensuring the smooth and efficient operation of our mobile application. Responsibilities Responsible for collecting and verifying content data related to the supplier side, parent side, and p

    Job Source: ChillUP
  • Canonical

    Travel Operations Specialist

    Manama, CAPITAL GOVERNORATE, Bahrain

    Home based - Middle East, Manama, Bahrain Canonical is a leading provider of open source software and operating systems to the global enterprise and technology markets. Our platform, Ubuntu, is very widely used in breakthrough enterprise initiatives such as public cloud, data science, AI, engineering innovation and IoT. Our customers include the wo

    Job Source: Canonical
  • Chillup

    App operation specialist

    Budaiya

    We are seeking a highly organized and detail-oriented App Operations Specialist to join our team. As an App Operations Specialist, you will be responsible for ensuring the smooth and efficient operation of our mobile application. Responsibilities Responsible for collecting and verifying content data related to the supplier side, parent side, and p

    Job Source: Chillup
  • Canonical

    Security Risk Management Specialist

    Manama, CAPITAL GOVERNORATE, Bahrain

    Home based - Middle East, Manama, Bahrain In security risk management we’re looking to harness the power of industry best practice combined with driving new innovation on how we do security risk assessments and modelling. Our security risk management team is the primary owner of the strategy and practices of how we identify, track and reduce our se

    Job Source: Canonical
  • Canonical

    Security risk management specialist

    Manama

    Home based - Middle East, Manama, Bahrain In security risk management we’re looking to harness the power of industry best practice combined with driving new innovation on how we do security risk assessments and modelling. Our security risk management team is the primary owner of the strategy and practices of how we identify, track and reduce our se

    Job Source: Canonical
  • Client Of 6 Pence

    Senior information security specialist - bahrain

    Bahrain

    Senior Information Security Specialist - Bahrain One of our clients is looking in for an experienced Senior Information Security Specialist Duties & Responsibilities:• Monitoring the system and ensure the system available 24/7.• Maintain the best practices and security standards.• Design and implement security solutions that protect the organizatio

    Job Source: Client Of 6 Pence
  • Client of 6 Pence

    Senior Information Security Specialist - Bahrain

    , Bahrain

    Senior Information Security Specialist - Bahrain One of our clients is looking in for an experienced Senior Information Security SpecialistDuties & Responsibilities:• Monitoring the system and ensure the system available 24/7.• Maintain the best practices and security standards.• Design and implement security solutions that protect the organization

    Job Source: Client of 6 Pence

Security operations specialist

Manama

د.ب.‏ 27500 BHD Per annum

As a Security Operations Specialist at Infonas, you will play a crucial role in identifying, analyzing, and reporting events that occur or might occur within the network. Your primary responsibility will be to use defensive measures and information collected from various sources to protect information, information systems, and networks from potential threats. You will utilize your expertise in cybersecurity and privacy principles to assess organizational requirements and apply appropriate techniques for detecting and responding to intrusions. Additionally, you will conduct vulnerability scans, analyze malware, interpret network tool information, and contribute to the development of cyber defense tools. Main Tasks & Responsibilities Characterize and analyze network traffic to identify anomalous activity and potential threats. Analyze identified malicious activity to determine weaknesses exploited and their effects on systems and information. Conduct research, analysis, and correlation across various data sets to identify indications and warnings. Validate intrusion detection system (IDS) alerts through packet analysis. Assist in the construction of signatures for cyber defense network tools to respond to new or observed threats. Monitor external data sources to stay updated on cyber defense threat conditions. Assess and monitor cybersecurity related requirements to system implementation and testing practices. Provide recommendations for disaster recovery, contingency, and continuity of operations plans. Collaborate with enterprise-wide IT and network staff to validate network alerts and share relevant information. Document and escalate incidents that may impact the environment for further action. Provide timely detection, identification, and alerting of possible attacks, intrusions, and anomalous activities. Collaborate with stakeholders to resolve computer security incidents and ensure vulnerability compliance. Perform regular information security reviews to ensure the upkeep and relevance of the information security management system. Monitor logs and security tools on a periodic basis to ensure that any anomalous activity is accordingly mitigated. Monitor logs to ensure that system backups are appropriately being taken. Monitor logical access on a periodic basis to ensure no unauthorized access takes places and no unnecessary privileges are being assigned and dormant users are appropriately revoked. Continuously assess the physical security measures, surveillance systems, and access control measures to detect and respond to potential security threats or breaches. Provide appropriate guidance to ensure that network devices such as firewalls, switches and routers are appropriately hardened. Knowledge & Skills Solid understanding of computer networking concepts, protocols, and network security methodologies. Proficiency in analyzing malware and conducting vulnerability scans. Strong knowledge of cybersecurity and privacy principles, including relevant laws and regulations. Familiarity with intrusion detection and security monitoring technologies. Ability to interpret information collected by network tools such as Nslookup, Ping, and Traceroute. Strong analytical skills and the ability to recognize and categorize vulnerabilities and associated attacks. Experience in using incident handling methodologies and protocol analyzers. Effective communication skills to document and report incidents, trends, and system security posture. Familiarity with cyber defense tools and their capabilities. Knowledge of encryption algorithms, cryptography, and cryptographic key management concepts. Understanding of network traffic analysis methods and network access control mechanisms. Proficiency in operating systems, network protocols, and security system design tools. Familiarity with telecommunications concepts and Virtual Private Network (VPN) security. Experience in conducting packet-level analysis using tools like Wireshark. Strong problem-solving skills and the ability to work collaboratively in a team environment. Knowledge of computer programming languages. Qualifications and Experience Bachelor’s Degree/Masters Degree in Information Security, Computer Science, Digital Forensics, Cybersecurity, Information Assurance, Security Risk Management, Network Security or any other related field or equivalent security experience. Certifications are a plus but are not essential provided that the job requirements are met. Communication: Clear and effective exchange of information, both verbally and in writing. Collaboration: Working well with others in a team-oriented environment. Adaptability: Being flexible and open to change in a dynamic work environment. Problem-solving: Identifying, analyzing, and solving problems effectively. Time management: Efficiently managing one’s own time and prioritizing tasks. Emotional intelligence: Understanding and managing emotions, as well as empathizing with others. Leadership: Influencing and guiding others towards common goals. Conflict resolution: Addressing and resolving conflicts in a constructive manner. Creativity: Thinking outside the box and generating innovative ideas. Work ethic: Demonstrating strong commitment, reliability, and accountability. Cultural diversity: Ability to work effectively with individuals from diverse cultural backgrounds by recognizing, respecting, and valuing the differences and unique perspectives that individuals from different cultures bring to the workplace. Critical and analytical thinking: The ability to systematically and objectively analyze information, situations, and problems to arrive at well-reasoned and informed decisions. The ability to question assumptions, consider alternative perspectives, and evaluate evidence and arguments. The ability to identify relevant information, distinguish between fact and opinion, and recognize biases or logical fallacies. Motivation: Highly motivated individual who demonstrates a strong drive to excel in their work, consistently delivering results and surpassing expectations. Positive attitude: a self-starting attitude, taking initiative and displaying a proactive approach to problem-solving and achieving team objectives. Growth Mindset: Intrinsically motivated, continuously seeking opportunities for growth, learning and development, and maintaining a positive and enthusiastic mindset even in challenging situations. Accountability and ownership: Demonstrates accountability for their actions, taking ownership of their work and accepting responsibility for delivering high-quality results. Demonstrates a strong sense of ownership, proactively taking initiative and holding themselves accountable for meeting objectives and driving success within their role. Security Operations Specialist Main purpose As a Security Operations Specialist at Infonas, you will play a crucial role in identifying, analyzing, and reporting events that occur or might occur within the network. Your primary responsibility will be to use defensive measures and information collected from various sources to protect information, information systems, and networks from potential threats. You will utilize your expertise in cybersecurity and privacy principles to assess organizational requirements and apply appropriate techniques for detecting and responding to intrusions. Additionally, you will conduct vulnerability scans, analyze malware, interpret network tool information, and contribute to the development of cyber defense tools. Main Tasks & Responsibilities Characterize and analyze network traffic to identify anomalous activity and potential threats. Analyze identified malicious activity to determine weaknesses exploited and their effects on systems and information. Conduct research, analysis, and correlation across various data sets to identify indications and warnings. Validate intrusion detection system (IDS) alerts through packet analysis. Assist in the construction of signatures for cyber defense network tools to respond to new or observed threats. Monitor external data sources to stay updated on cyber defense threat conditions. Assess and monitor cybersecurity related requirements to system implementation and testing practices. Provide recommendations for disaster recovery, contingency, and continuity of operations plans. Collaborate with enterprise-wide IT and network staff to validate network alerts and share relevant information. Document and escalate incidents that may impact the environment for further action. Provide timely detection, identification, and alerting of possible attacks, intrusions, and anomalous activities. Collaborate with stakeholders to resolve computer security incidents and ensure vulnerability compliance. Perform regular information security reviews to ensure the upkeep and relevance of the information security management system. Monitor logs and security tools on a periodic basis to ensure that any anomalous activity is accordingly mitigated. Monitor logs to ensure that system backups are appropriately being taken. Monitor logical access on a periodic basis to ensure no unauthorized access takes places and no unnecessary privileges are being assigned and dormant users are appropriately revoked. Continuously assess the physical security measures, surveillance systems, and access control measures to detect and respond to potential security threats or breaches. Provide appropriate guidance to ensure that network devices such as firewalls, switches and routers are appropriately hardened. Knowledge & Skills Solid understanding of computer networking concepts, protocols, and network security methodologies. Proficiency in analyzing malware and conducting vulnerability scans. Strong knowledge of cybersecurity and privacy principles, including relevant laws and regulations. Familiarity with intrusion detection and security monitoring technologies. Ability to interpret information collected by network tools such as Nslookup, Ping, and Traceroute. Strong analytical skills and the ability to recognize and categorize vulnerabilities and associated attacks. Experience in using incident handling methodologies and protocol analyzers. Effective communication skills to document and report incidents, trends, and system security posture. Familiarity with cyber defense tools and their capabilities. Knowledge of encryption algorithms, cryptography, and cryptographic key management concepts. Understanding of network traffic analysis methods and network access control mechanisms. Proficiency in operating systems, network protocols, and security system design tools. Familiarity with telecommunications concepts and Virtual Private Network (VPN) security. Experience in conducting packet-level analysis using tools like Wireshark. Strong problem-solving skills and the ability to work collaboratively in a team environment. Knowledge of computer programming languages. Qualifications and Experience Bachelor’s Degree/Masters Degree in Information Security, Computer Science, Digital Forensics, Cybersecurity, Information Assurance, Security Risk Management, Network Security or any other related field or equivalent security experience. Certifications are a plus but are not essential provided that the job requirements are met. Key Competencies Communication: Clear and effective exchange of information, both verbally and in writing. Collaboration: Working well with others in a team-oriented environment. Adaptability: Being flexible and open to change in a dynamic work environment. Problem-solving: Identifying, analyzing, and solving problems effectively. Time management: Efficiently managing one’s own time and prioritizing tasks. Emotional intelligence: Understanding and managing emotions, as well as empathizing with others. Leadership: Influencing and guiding others towards common goals. Conflict resolution: Addressing and resolving conflicts in a constructive manner. Creativity: Thinking outside the box and generating innovative ideas. Work ethic: Demonstrating strong commitment, reliability, and accountability. Cultural diversity: Ability to work effectively with individuals from diverse cultural backgrounds by recognizing, respecting, and valuing the differences and unique perspectives that individuals from different cultures bring to the workplace. Critical and analytical thinking: The ability to systematically and objectively analyze information, situations, and problems to arrive at well-reasoned and informed decisions. The ability to question assumptions, consider alternative perspectives, and evaluate evidence and arguments. The ability to identify relevant information, distinguish between fact and opinion, and recognize biases or logical fallacies. Motivation: Highly motivated individual who demonstrates a strong drive to excel in their work, consistently delivering results and surpassing expectations. Positive attitude: a self-starting attitude, taking initiative and displaying a proactive approach to problem-solving and achieving team objectives. Growth Mindset: Intrinsically motivated, continuously seeking opportunities for growth, learning and development, and maintaining a positive and enthusiastic mindset even in challenging situations. Accountability and ownership: Demonstrates accountability for their actions, taking ownership of their work and accepting responsibility for delivering high-quality results. Demonstrates a strong sense of ownership, proactively taking initiative and holding themselves accountable for meeting objectives and driving success within their role. Send your CV to [email protected] withvacancy title: Security Operations Specialistvacancy code: 25366 By clicking “I Agree”, you are consenting to the processing of your personal information asdescribed in Infonas’Privacy Policy. The details, including your name, email address/phone number, will be used to address your queryand/or share information related to our products/services. Should you wish not to receive such information please reach out to our DPO [email protected] What about other tracking technologies, like web beacons?Links to other websites Where can I get further information?

#J-18808-Ljbffr

Apply