Enable job alerts via email!

IT Security Specialist

Altron

Sharjah

On-site

AED 120,000 - 200,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm in Sharjah is seeking a professional to develop and enforce cybersecurity policies, monitor systems for threats, and ensure compliance with data privacy laws. Candidates should have experience in risk assessments and staff training in security best practices. This role is critical in safeguarding organizational data and ensuring optimal security infrastructure.

Qualifications

  • Experience in developing and enforcing cybersecurity policies and protocols.
  • Knowledge of GDPR, HIPAA, and other data privacy regulations.
  • Ability to monitor systems for security threats.

Responsibilities

  • Develop and enforce cybersecurity policies, procedures, and protocols.
  • Monitor systems, servers, and networks for security threats.
  • Conduct regular risk assessments and security audits.

Skills

Cybersecurity policy development
Data privacy compliance
Incident response
Risk assessment
Staff training
Job description
Security Strategy & Policy Development
  • Develop and enforce cybersecurity policies, procedures, and protocols.
  • Create plans to safeguard and recover data in case of breaches or loss.
  • Ensure compliance with data privacy laws and regulatory frameworks (e.g., GDPR, HIPAA).
Threat Monitoring & Incident Response
  • Monitor systems, servers, and networks for security threats and anomalies.
  • Respond to data breaches, malware attacks, and other security incidents.
  • Conduct forensic analysis and maintain incident response plans.
Vulnerability Management
  • Conduct regular risk assessments, penetration testing, and security audits.
  • Identify and remediate system vulnerabilities using appropriate tools.
Infrastructure Protection
  • Manage firewalls, intrusion detection systems, antivirus software, and endpoint protection.
  • Maintain and update security infrastructure to ensure optimal performance.
Employee Awareness & Training
  • Train staff on security best practices, including phishing awareness and password hygiene.
  • Simulate data loss scenarios to evaluate recovery plans and readiness.
Compliance & Reporting
Collaboration & Development
Continuous Improvement
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.