Roles and responsibilities
To support and execute the IT security requirements and roadmap within the bank Technology requirement. IT Security Specialist is responsible for management and strategic direction of the IT security team within the organization. The primary focus of this role is on leadership, coordination, and ensuring that the IT security
function operates effectively and aligns with the organization's broader goals. Protecting the organization’s information systems and data from security threats.
Main Accountabilities (Maximum Of 10)
- Implement security policies, protocols, and procedures required.
- Manage security systems, including firewalls, intrusion detection systems, anti-virus software and new added tools
- Conduct regular risk assessments and vulnerability tests to Identify potential security threats and take proactive steps to mitigate risks.
- Respond to Technology related security breaches and other incidents.
- Support in any forensic investigations to determine the root cause of incidents.
- Ensure compliance with industry standards and regulations (e.g., GDPR, HIPAA, PCI-DSS).
- Prepare and maintain documentation of compliance activities.
- Work with IT and IS teams to ensure security measures are integrated into the design and implementation of IT systems.
- Manage IT security projects, including planning, execution, and delivery, ensuring they meet organizational requirements and timelines.
- Collaborate with external vendors and partners to enhance security measures.
- Proficiency in security technologies and tools (e.g., SIEM, IDS/IPS).
- Understanding of network and operating system security.
- Knowledge of encryption and authentication technologies
Preferred Qualifications, Skills & Experience
- At least 8 years of experience in Banking and financial institutes.
- Proven experience in IT security management, including experience in a leadership or team lead role
- Strong understanding of security technologies, threat landscapes, and risk management practices.
- Excellent written and verbal communication skills in English - Arabic is a plus
Desired candidate profile
1. Risk Assessment and Management
- Threat Analysis: Continuously monitor potential threats to the IT infrastructure, including malware, phishing, ransomware, and vulnerabilities in hardware or software.
- Risk Identification: Conduct regular security assessments (e.g., penetration testing, vulnerability assessments) to identify weaknesses in systems and networks.
- Risk Mitigation: Develop and implement strategies and controls to reduce or eliminate identified risks, such as firewalls, encryption, and multi-factor authentication.
2. Security Design and Architecture
- Secure Infrastructure Design: Design and implement secure network architectures, ensuring that security best practices (e.g., segmentation, firewalls, secure access controls) are applied.
- Application Security: Ensure secure development practices are followed for new applications, including code reviews, secure coding guidelines, and vulnerability assessments.
- Cloud Security: Implement security measures for cloud-based systems and services, ensuring compliance with security standards like ISO 27001, SOC 2, and NIST.
3. Incident Response and Management
- Incident Detection: Monitor systems for signs of security incidents, including unauthorized access or abnormal activities.
- Incident Response: Develop and implement response plans to effectively manage and mitigate security breaches, including containment, eradication, and recovery processes.
- Post-Incident Analysis: Conduct root cause analysis after a security incident, and apply lessons learned to improve future incident response plans.
4. Security Monitoring and Threat Intelligence
- Continuous Monitoring: Use security information and event management (SIEM) tools (e.g., Splunk, LogRhythm) to monitor network traffic, logs, and endpoints for unusual activities or potential threats.
- Threat Intelligence: Gather intelligence about emerging threats and vulnerabilities from external sources, such as threat feeds, industry reports, and collaboration with other security professionals.
- Network Monitoring: Set up and manage intrusion detection/prevention systems (IDS/IPS) to monitor network traffic for suspicious activities.
5. Access Control and Identity Management
- Authentication: Implement secure authentication mechanisms like multi-factor authentication (MFA), single sign-on (SSO), and biometrics to safeguard access to critical systems.
- User Access Management: Enforce the principle of least privilege (PoLP) and ensure that users only have access to the resources they need to perform their job functions.
- Privileged Access Management: Control and monitor the use of privileged accounts, ensuring that administrators have appropriate access rights, which are tracked and logged.
6. Compliance and Governance
- Regulatory Compliance: Ensure that the organization meets industry regulations and compliance standards (e.g., GDPR, HIPAA, PCI DSS, SOC 2).
- Audit and Documentation: Maintain proper documentation of security policies, procedures, and controls. Participate in audits and provide evidence of compliance with security standards.
- Security Policies: Develop, implement, and enforce security policies and procedures, covering areas such as password management, data protection, and incident response.