كلما زادت طلبات التقديم التي ترسلينها، زادت فرصك في الحصول على وظيفة!

إليك لمحة عن معدل نشاط الباحثات عن عمل خلال الشهر الماضي:

عدد الفرص التي تم تصفحها

عدد الطلبات التي تم تقديمها

استمري في التصفح والتقديم لزيادة فرصك في الحصول على وظيفة!

هل تبحثين عن جهات توظيف لها سجل مثبت في دعم وتمكين النساء؟

اضغطي هنا لاكتشاف الفرص المتاحة الآن!
نُقدّر رأيكِ

ندعوكِ للمشاركة في استطلاع مصمّم لمساعدة الباحثين على فهم أفضل الطرق لربط الباحثات عن عمل بالوظائف التي يبحثن عنها.

هل ترغبين في المشاركة؟

في حال تم اختياركِ، سنتواصل معكِ عبر البريد الإلكتروني لتزويدكِ بالتفاصيل والتعليمات الخاصة بالمشاركة.

ستحصلين على مبلغ 7 دولارات مقابل إجابتك على الاستطلاع.


تم إلغاء حظر المستخدم بنجاح
https://bayt.page.link/VxB1UKfCzTLdnqaU6
العودة إلى نتائج البحث‎
خدمات الدعم التجاري الأخرى
أنشئ تنبيهًا وظيفيًا لوظائف مشابهة
تم إيقاف هذا التنبيه الوظيفي. لن تصلك إشعارات لهذا البحث بعد الآن.

الوصف الوظيفي

Description



1- MS D365 CRM
2- MS power automate development
3- MS Power App development



IT Infrastructure Security
 Plan, develop, update, and implement corporate information security standards & guidelines encompassing data, physical & intellectual security in order to secure the integrity of both IT and OT (Plants) systems.
 Perform risk analysis to identify any security issues that could lead to loss of data or unavailability of service.
 Perform penetration testing and vulnerability scanning on periodic basis to identify and patch vulnerable systems.
 Monitor and identify any unauthorized or suspicious behavior in the traffic (internal and external) and notify concerned function head to ensure data safety and integrity.
 Provide technical guidance and training to IT users and design and implement programs for user awareness, compliance monitoring and security compliance to ensure organization-wide awareness of the importance of securing the network.
 Coordinate disaster recovery and business continuation planning to ensure back up plans are in place in case of any emergencies and data integrity and reliability are protected at all times.
 Implement, upgrade, repair, and modify or replace information security devices or software to ensure secure access to enterprise files and data elements.
Additional IT Help Desk Operations
 Carry out IT help desk work within the department procedures to ensure consistency of service to users.
 Support users in the use of computer equipment by the provision of advice, training, and solutions to their problems, escalating the problem to the relevant authority when the answer is not readily available.
 Provides proactive and reactive end user support and remote support to immediately resolve any end user problems.
 Answer and log calls from IT users to gain an understanding of their software application problems and properly issue work tickets for easy identification of problem.
 Coordinate with vendors for various tasks such as maintenance of software and hardware devices.
 Install and configure computer hardware operating systems and applications.
 Set up hardware devices for new employees.
 In case of a leaving employee and on request of HR deregister employee and collect all hardware and other items issued to him/her.
 Diagnose and solve hardware/software faults according to assigned priority.
 Handle procurement tasks including solution analysis, product research, vendor communication and documentation.
Policies, Systems, Processes & Procedures
 Follow all relevant departmental policies, processes, standard operating procedures, and instructions so that work is carried out in a controlled and consistent manner.
Continuous Improvement
 Contribute to the identification of opportunities for continuous improvement and sustainability of systems, processes and practices considering global standards, productivity improvement and cost reduction.
Reporting
 Assist in the preparation of timely and accurate statements and reports to meet department requirements, policies, and quality standards.
 Proactively protect the integrity, confidentiality, and availability of information in the custody of, or processed by, the company, providing regular reports to superiors regarding the effectiveness of network and data security and making recommendations for the adoption of new procedures and technologies as required.
Related Assignments
 The job holder may be required to undertake additional duties, which may be reasonably expected and forms part of the function of the job.



7. QUALIFICATIONS, EXPERIENCE & SKILLS
Minimum Qualifications:
 Bachelor’s degree in Computer Science, Computer Engineering, or a related field
 Master’s degree in Cybersecurity is preferrable
 Up-to-date Global Industrial Cyber Security Professional (GICSP) certification is preferrable
Minimum Experience:
 3 years of relevant experience in a similar role
Job-Specific Skills (Generic / Technical):
 Proficiency in English
 Relevant security certifications
 Good communication and inter-personal skills
 Good knowledge and understanding of business and business processes
 Knowledge of vulnerability scanning, firewalls, IDS/IPS, malwares, networking, and encryption protocols
 Familiarity with ICS (Industrial Control System) security and SCADA systems



Interested candidates may share their updated resume with the subject line to : [email protected]





لقد تمت ترجمة هذا الإعلان الوظيفي بواسطة الذكاء الاصطناعي وقد يحتوي على بعض الاختلافات أو الأخطاء البسيطة.

لقد تجاوزت الحد الأقصى المسموح به للتنبيهات الوظيفية (15). يرجى حذف أحد التنبيهات الحالية لإضافة تنبيه جديد.
تم إنشاء تنبيه وظيفي لهذا البحث. ستصلك إشعارات فور الإعلان عن وظائف جديدة مطابقة.
هل أنت متأكد أنك تريد سحب طلب التقديم إلى هذه الوظيفة؟

لن يتم النظر في طلبك لهذة الوظيفة، وسيتم إزالته من البريد الوارد الخاص بصاحب العمل.