Submitting more applications increases your chances of landing a job.

Here’s how busy the average job seeker was last month:

Opportunities viewed

Applications submitted

Keep exploring and applying to maximize your chances!

Looking for employers with a proven track record of hiring women?

Click here to explore opportunities now!
We Value Your Feedback

You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for

Would You Be Likely to Participate?

If selected, we will contact you via email with further instructions and details about your participation.

You will receive a $7 payout for answering the survey.


User unblocked successfully
https://bayt.page.link/VxB1UKfCzTLdnqaU6
Back to the job results
Other Business Support Services
Create a job alert for similar positions
Job alert turned off. You won’t receive updates for this search anymore.

Job description

Description



1- MS D365 CRM
2- MS power automate development
3- MS Power App development



IT Infrastructure Security
 Plan, develop, update, and implement corporate information security standards & guidelines encompassing data, physical & intellectual security in order to secure the integrity of both IT and OT (Plants) systems.
 Perform risk analysis to identify any security issues that could lead to loss of data or unavailability of service.
 Perform penetration testing and vulnerability scanning on periodic basis to identify and patch vulnerable systems.
 Monitor and identify any unauthorized or suspicious behavior in the traffic (internal and external) and notify concerned function head to ensure data safety and integrity.
 Provide technical guidance and training to IT users and design and implement programs for user awareness, compliance monitoring and security compliance to ensure organization-wide awareness of the importance of securing the network.
 Coordinate disaster recovery and business continuation planning to ensure back up plans are in place in case of any emergencies and data integrity and reliability are protected at all times.
 Implement, upgrade, repair, and modify or replace information security devices or software to ensure secure access to enterprise files and data elements.
Additional IT Help Desk Operations
 Carry out IT help desk work within the department procedures to ensure consistency of service to users.
 Support users in the use of computer equipment by the provision of advice, training, and solutions to their problems, escalating the problem to the relevant authority when the answer is not readily available.
 Provides proactive and reactive end user support and remote support to immediately resolve any end user problems.
 Answer and log calls from IT users to gain an understanding of their software application problems and properly issue work tickets for easy identification of problem.
 Coordinate with vendors for various tasks such as maintenance of software and hardware devices.
 Install and configure computer hardware operating systems and applications.
 Set up hardware devices for new employees.
 In case of a leaving employee and on request of HR deregister employee and collect all hardware and other items issued to him/her.
 Diagnose and solve hardware/software faults according to assigned priority.
 Handle procurement tasks including solution analysis, product research, vendor communication and documentation.
Policies, Systems, Processes & Procedures
 Follow all relevant departmental policies, processes, standard operating procedures, and instructions so that work is carried out in a controlled and consistent manner.
Continuous Improvement
 Contribute to the identification of opportunities for continuous improvement and sustainability of systems, processes and practices considering global standards, productivity improvement and cost reduction.
Reporting
 Assist in the preparation of timely and accurate statements and reports to meet department requirements, policies, and quality standards.
 Proactively protect the integrity, confidentiality, and availability of information in the custody of, or processed by, the company, providing regular reports to superiors regarding the effectiveness of network and data security and making recommendations for the adoption of new procedures and technologies as required.
Related Assignments
 The job holder may be required to undertake additional duties, which may be reasonably expected and forms part of the function of the job.



7. QUALIFICATIONS, EXPERIENCE & SKILLS
Minimum Qualifications:
 Bachelor’s degree in Computer Science, Computer Engineering, or a related field
 Master’s degree in Cybersecurity is preferrable
 Up-to-date Global Industrial Cyber Security Professional (GICSP) certification is preferrable
Minimum Experience:
 3 years of relevant experience in a similar role
Job-Specific Skills (Generic / Technical):
 Proficiency in English
 Relevant security certifications
 Good communication and inter-personal skills
 Good knowledge and understanding of business and business processes
 Knowledge of vulnerability scanning, firewalls, IDS/IPS, malwares, networking, and encryption protocols
 Familiarity with ICS (Industrial Control System) security and SCADA systems



Interested candidates may share their updated resume with the subject line to : [email protected]





This job post has been translated by AI and may contain minor differences or errors.

You’ve reached the maximum limit of 15 job alerts. To create a new alert, please delete an existing one first.
Job alert created for this search. You’ll receive updates when new jobs match.
Are you sure you want to unapply?

You'll no longer be considered for this role and your application will be removed from the employer's inbox.