Submitting more applications increases your chances of landing a job.
Here’s how busy the average job seeker was last month:
Opportunities viewed
Applications submitted
Keep exploring and applying to maximize your chances!
Looking for employers with a proven track record of hiring women?
Click here to explore opportunities now!You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for
Would You Be Likely to Participate?
If selected, we will contact you via email with further instructions and details about your participation.
You will receive a $7 payout for answering the survey.
Charterhouse is partnering with a leading organization as they expand their technology and security operations in the UAE. Our client is looking to hire a highly skilled Cybersecurity Manager who will play a critical role in safeguarding enterprise systems, ensuring compliance with global security standards, and driving the implementation of robust security strategies across the organization.
About the Role
In this role, the Cybersecurity Manager will design and oversee security frameworks, policies, and controls to protect sensitive data and infrastructure. The position involves managing risk assessments, vulnerability management, and incident response, while collaborating with cross-functional teams to embed security best practices into all technology initiatives.
The technology environment includes cloud platforms such as AWS and Azure, SIEM tools like Splunk and QRadar, endpoint protection solutions, firewalls, IDS/IPS systems, and vulnerability scanning tools. The role will also involve implementing security automation, monitoring threat intelligence feeds, and ensuring timely remediation of identified risks.
About You
The ideal candidate will have at least three years in a managerial or leadership capacity. The candidate should possess strong knowledge of network security, cloud security, and application security, along with hands-on experience using SIEM, firewalls, endpoint protection, and vulnerability management tools. A proven ability to manage incident response, risk assessments, and compliance audits is essential.
You'll no longer be considered for this role and your application will be removed from the employer's inbox.