- Evaluate, Implement and manage security solutions / projects across the Arab Bank globally.
- Follow up ITC to ensure proper use and implementation of security solution in Arab bank globally.
- Continuously Evaluate IT security threats / needs for Arab Bank globally and develop, design, recommend counter measures.
- Develop security standards and manuals for all systems.
- Security monitoring that will cover the following: A) Internet security devices (Internet Firewalls, F5, IPS, DMZ HIPS, FireEye Network/Email, etc.. B) End point security controls logs (antivirus, FireEye agents) C) ·Web Browsing and OpenDNS logs. D) ·Vulnerability management system.
-
Cybersecurity Specialist
تم العثور عليها في: DrJobEn JO A2 - منذ 20 ساعة
Arab Bank Amman, الأردنEvaluate, Implement and manage security solutions / projects across the Arab Bank globally. · Follow up ITC to ensure proper use and implementation of security solution in Arab bank globally. · Continuously Evaluate IT security threats / needs for Arab Bank globally and develop, ...
-
Cybersecurity Specialist
تم العثور عليها في: DrJobEn JO A2 - منذ 20 ساعة
Arab Bank Amman, الأردنEvaluate, Implement and manage security solutions / projects across the Arab Bank globally. · Follow up ITC to ensure proper use and implementation of security solution in Arab bank globally. · Continuously Evaluate IT security threats / needs for Arab Bank globally and develop, ...
-
Cybersecurity Specialist
تم العثور عليها في: DrJobEn JO A2 - منذ يومين
Netcompany-Intrasoft Amman, الأردنAbout the job · Job Description · Conduct application security testing to fortify systems against evolving threats. · Lead in the implementation of Cybersecurity standards & controls to ensure robust security measures. · Employ dark internet visibility to proactively identify pot ...
-
Technical Security Specialist
تم العثور عليها في: DrJobEn JO A2 - منذ يومين
Braintrust Amman, الأردنob Summary · As a TECH Security Specialist at TGBS, you will be responsible for safeguarding remote end-user devices and Cloud systems. You will plan and implement security measures to protect sensitive data and systems from cyber attacks, hacking attacks, intrusion, infiltration ...