Head of network security

Information technology

Location: Cairo - EGYPT
Age: 30 - 50 years
Experience: 12 - 25 years
Gender: All
Open vacancies: 10
Job description: Key Responsibilities and Accountabilities
• Design secure architectures for the deployment of our organization’s deployments in conjunction with the relevant teams (software, systems, and networks)
• Develop policies and procedures for the secure deployment and administration of network equipment and infrastructure
• Audit and Assess networks deployments on a regular basis to ensure compliance to standards
• Follow up with suppliers on pending issues regarding installation or maintenance of systems
• Deploy systems to ensure that the SOC is able to effectively monitor key network security
• Analyze the security requirements of a global voice and data network and drive the implementation and operations of best practices to ensure their security
• Support internal and external security and compliance audits
• Make timely and effective decisions that are based on sound judgment and business rationale
• Prepare (RFI’s & RFP’s) for new projects and fill out specifications for (MR: Material Requisition) forms
• Participate in the technical evaluation of received equipment and systems
Required skills:
  • Skills: • Experience configuring security incident and event management tools (such as QRadar)
  • including creating event filtering and correlation rules and reports. • Candidate must have experience using network security tools such as NeXpose
  • Nessus
  • Nmap
  • Ettercap
  • Hashcat
  • Metasploit
  • Aircrack
  • Burp Suite
  • Acunetix
  • FTK
  • Sleuth Kit
  • Wireshark
  • Tcpdump
  • Netcat
  • and similar tools. • Must have a strong understanding of the following: Log correlation
  • SIEM technologies
  • IDS/IPS
  • AV/EDR/XDR technologies
  • Application Flow data and other related technologies • Mentor junior engineers in security knowledge and experience in technologies and methodologies as it relates to operating systems
  • firewalls
  • proxies
  • access controls
  • encryption
  • networking
  • programming/scripting
  • auditing
  • vulnerability assessments
  • intrusion management and operations management to assist the Threat and Vulnerability Management team with effective research
  • data gathering
  • analysis
  • metrics reporting and communications. • Certifications highly desirable: CCIE - Security
  • CCNP
  • CCSP
  • CCSA
  • JNCIA
  • GCIA
  • GCIH
  • GPEN
  • GCFW
  • GSNA.
Salary: Negotiable