Root-CA Manager
ITIDA -
6th of October, GizaPosted 6 years ago16Applicants for1 open position
- 3Viewed
- 1In Consideration
- 1Not Selected
Job Details
Experience Needed:
Career Level:
Education Level:
Salary:
Job Categories:
Skills And Tools:
Job Description
- Managing various processes related to maintaining Root-CA operations availability.
- Technical maintenance and support contracts renewal supervision.
- Issuing operation related policies and setting required controls for compliance.
- Supervising trust center related physical aspects from light current and physical security.
- Providing consultation related to securing electronic transactions in different technical committees.
- Root-CA technical team supervision to maintain operations around the clock.
- Communicating with the e-signature service providers for technical Audit and law compliance nevertheless providing technical consultation.
- Providing PKI technical consultation for ITIDA and other governmental entities.
- Preparing technical reports related to e-signature related legal dispute in the court of law.
- Studying and reviewing technical requirements for needed for cross-certification with other countries.
Job Requirements
- Bachelor degree in communication/computer engineering/computer science from a reputable/respectable university i.e. Cairo university- Ein shams university- AAST- AUC
- Master or Phd. degree is a plus
- Various information security certifications are required on different levels or equivalent education. i.e. Enterprise courses, information security institutes certificates (e.g. CISSP, CISA, CISM,…), Governance related certificates (ITIL, COBIT, …), system/solution related certificates, etc…
- At least 10 years in general information security sector with at least 5 years specific PKI technology.
- Governmental sector experience is preferred.
- A clear understanding of:
- Different PKI architectures.
- Managing and applying PKI on a national level.
- PKI standers and best practices.
- Writing and reviewing certificate Policy (CP) and certificate practice statement (CPS).
- PKI applications different working modes.
- Cryptographic solutions implementation.
- Cyber security.
- Digital certificate life cycle.
- Information security and risk management.
- Business Impact Analysis and Business Continuity Planning.