9 أغسطس 2018
السعودية

Information Security Manager

    job title :

    Information Security Manager

    publisher

    الجاسرية الجاسرية

    address :

    الرياض , السعودية – السعوديه

    publish date :

    9 أغسطس 2018

    End in :

    17 يوم


تفاصيل الوظيفة

تابع وظائف تخصصك فى جميع الصحف والمواقع العربيه

باستخدام الفيس بوك باستخدام جوجل



Oversee the execution of plans, report progress, issues performance and provide guidance and coordinate the development and maintenance of procedures, policies and strategies. - Oversee the development and continual improvement of secure business continuity management and disaster recovery strategies. - Provide strategic guidance related to information security projects and assist in the evaluation and recommendation of technical controls. - Organizations and 3rd party service providers to improve information security systems and processes. - Having good knowledge and experience with information security methodologies, framework, design and policies. - Must have deep understanding of regional and local regulations pertaining to information security and data privacy. - Developing and maintaining the following: - Cyber security strategy. - Cyber security policy. - Cyber security architecture. - Cyber security risk management process. - Ensuring that detailed security standards and procedures are established, approved and implemented. - Delivering risk..based cyber security solutions that address people, process and technology. - Developing the cyber security staff to deliver cyber security solutions in a business context. - Cyber security activities across the Member Organization, including: - Monitoring of the cyber security activities [SOC monitoring]. - Monitoring of compliance with cyber security regulations, policies, standards and procedures. - Overseeing the investigation of cyber security incidents. - Gathering and analyzing threat intelligence from internal and external sources. - Performing cyber security reviews. - Conducting cyber security risk assessments for information assets. - Proactively supporting other functions on cyber security, including: - Performing information and system classifications. - Determining cyber security requirements for important projects. - Performing cyber security reviews. - Defining and conducting the cyber security awareness programs. - Measuring and reporting the KRIs and KPIs on: - Cyber security strategy. - Cyber security policy compliance. - Cyber security standards and procedures. - Cyber security programs : ]e.g., awareness program, data classification program, key cyber security improvements]. - اللغة الإنجليزية علوم الحاسب الآلي تكنولوجيا المعلومات الأمن الإلكتروني إدارة أمن المعلومات - Oversee the execution of plans, report progress, issues performance and provide guidance and coordinate the development and maintenance of procedures, policies and strategies. - Oversee the development and continual improvement of secure business continuity management and disaster recovery strategies. - Provide strategic guidance related to information security projects and assist in the evaluation and recommendation of technical controls. - Organizations and 3rd party service providers to improve information security systems and processes. - Having good knowledge and experience with information security methodologies, framework, design and policies. - Must have deep understanding of regional and local regulations pertaining to information security and data privacy. - Developing and maintaining the following: - Cyber security strategy. - Cyber security policy. - Cyber security architecture. - Cyber security risk management process. - Ensuring that detailed security standards and procedures are established, approved and implemented. - Delivering risk..based cyber security solutions that address people, process and technology. - Developing the cyber security staff to deliver cyber security solutions in a business context. - Cyber security activities across the Member Organization, including: - Monitoring of the cyber security activities [SOC monitoring]. - Monitoring of compliance with cyber security regulations, policies, standards and procedures. - Overseeing the investigation of cyber security incidents. - Gathering and analyzing threat intelligence from @









privacy policy