Home Jobs in Kuwait Jobs in Al Kuwait IT Manager Jobs in Al Kuwait IT Manager

IT Security Manager

Gulf Bank

Posted on December 26, 2019

10 - 11 years Al Kuwait - Kuwait

Any Graduation. Any Nationality

Opening 01

Job Description

EMAIL JOB
Email sent successfully.

*
Job
Purpose: The Information
Technology Security Manager ensures that the risk to the organization s
information posed by a variety of cyber threats (cyber-attacks; theft or
corruption from within; etc.) is minimized. The IT Security Manager ensures
that when cyber-attacks occur or data are stolen or compromised, these
incidents are dealt with promptly and effectively and the chance of that incident
recurring is minimized.
Accountabilities
Access Management
Manage identities and access controls based on identities (password
management, single sign on, two factor authentication, PIN management, digital
signatures, smart cards, biometrics, Active Directory, etc.)
Controlling external access through virtual private network connections
Application Security (DevOps in Projects)
Ensure security requirements are embedded in all projects from the onset
of any project and during the initial design phase and throughout the lifecycle
of the project.
Provide further technical security related guidance as required during
the build and testing stages of the projects.
Provide technical security input as required by the security policy
development team.
Implement security design of complex application and technology
architectures.
Manage technical design/review activities with various segments within
the Security team
Maintenance of systems and procedures to safeguard internal information
systems and databases.
Mapping Policy requirements to detailed technical implementation
requirements for IT Stakeholders
Software and application controls - implement, and maintain controls
necessary to protect software and applications in accordance with security
requirements (operating systems, applications, database management systems,
web-based PCI applications, COTS; maintenance)
Asset Security
Management and maintenance of Cyber asset inventories
Implement and maintain controls necessary to protect information and
vital assets (including media) in accordance with security requirements
(includes privacy requirements, PII, encryption, PKI, backups, DLP, data
retention/destruction)
Maintain software and applications inventories
Develop and maintain network, hardware, device, and system inventories
(including wireless)
Database & Data Security
Implementation of database security controls and settings as identified
by Information Security as being noted material gabs
Manage data discovery tooling to ensure availability of data discovery
for Information Security functions
Infrastructure Security
AD Policy implementation
On-going tuning of firewall rules and IPS Signatures and other security
devices as per the security stance requirements. Incident Support for this
function is required 24 x 7 x 365, immediate response
Ensure the creation and update of all related infrastructure diagrams
showing security infrastructure
Implement IDS / IPS sensor policies.
Implement, and maintain controls necessary to protect networks,
hardware, and systems in accordance with security requirements (intrusion
prevention/detection)
Implement, and maintain controls necessary to protect the
network/Internet perimeter in accordance with security requirements (firewalls,
DMZ, network connections, third-party connectivity, remote access, VPNs)
Manage the implementation and maintenance of controls necessary to
protect information and vital assets (including media) in accordance with
security requirements (includes privacy requirements, PII, encryption, PKI,
backups, DLP, data retention/destruction)
Manage and maintain software and applications inventories
Develop and maintain network, hardware, device, and system inventories
(including wireless)
Security Product Management
Manage and own the uptime, availability and operation of all security
tooling
Eliminate viruses and malicious code as directed by Information Security
Ensure Security Tooling has the latest updates configured
Ensure Security tooling is configured as per the requirements of
Information Security
Vulnerability Management
Tracking, management and implementation of patching activities
Maintain
security scanning tools and windowing environment to have scans as necessary


Banking / Financial Services / Broking

IT Software

Desired Candidate Profile

*
a) Education /
Qualifications: Bachelor s degree, with a technical major, such as
engineering or computer science.
IT Tech Knowledge : Knowledge
in infrastructure and application security standards, practices and tooling.
Domain:
Basic Banking knowledge in Banking applications and functional knowledge in
existing IT applications
Experience: 10 years in IT, IS, Security or related field
b)
Accreditation /
Licensing: CISP/CISA highly preferred
c)
Generic & Specific
Skills:
• Good communication skills
• Accuracy and attention to detail
• Analytical Thinking
• Required Technical expertise
• Project Management

Keywords

IT Security Manager

REPORT THIS JOB

Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information.We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at abuse@naukrigulf.com

Gulf Bank


View Contact Details
Additional Information Required

Employer has requested some additional information along with your application for this job

Login to Naukrigulf

Continue using

All your activity will remain private

or