Job Details
Experience Needed:
Career Level:
Education Level:
Salary:
Job Categories:
Skills And Tools:
Job Description
- Configure, deploy, and maintain the state enterprise security infrastructure.
- Implement firewall solutions to properly secure state data and provide consultation on all new firewall implementations, firewall configuration changes, and projects requiring security operational support.
- Analyze problems, recommend solutions, products, and technologies to meet business objectives.
- Assist with security breach investigations to guide the refinement of information security policies and practices.
- Work with project teams to design and implement secure network connectivity solutions.
- Implement network security policies, application security, access control, and corporate data safeguards.
- Develop and update business continuity and disaster recovery protocols.
- Conduct security audits and make policy recommendations.
- Identify threats and work to create steps to defend against them.
- Configure security systems such as firewalls, antivirus, and IDS/IPS software.
- Analyze current security requirements and make suggestions for improvements.
- Manage the allocation of access privileges of users to ensure appropriate security settings are applied in accordance with organization policies and application owner-defined parameters.
- Manage the periodic maintenance of security systems and applications to ensure new threats are identified and managed, and the security of the organization’s assets is maintained.
- Implement and monitor network security.
- Maintain network security: add, remove, and change authorities for network users.
- Serve as a secondary technical point of contact for network outages.
- Document all changes to system security for auditing purposes.
- Construct and maintain configurations for data security networks, VPN, and VOIP.
- Review recurring patches from vendors including Microsoft, Cisco, and other third-party software before implementation.
- Completely block unwanted websites to ensure employees stay focused on their daily tasks and goals.
- Actively protect state information technology assets and infrastructure from external or internal threats and ensure compliance with statutory and regulatory requirements regarding information access, security, and privacy.
- Monitor and report on the performance of network, servers, databases, and applications to ensure optimal availability and reliability.
- Identify bottlenecks and performance issues, and recommend or implement corrective measures.
- Ensure proactive detection and resolution of potential network performance and security issues.
- Provide performance reports and metrics to management for continuous improvement of IT infrastructure.
- Monitor and report on the performance of networks, system, and application security solutions to highlight areas of non-compliance and inform the development of improved practices and processes.
- Conduct regular (daily, weekly, quarterly) reviews of logs, alerts, and scan results, and generate reports and presentations.
- Provide support for Cisco firewalls, Palo Alto firewalls, VPNs, website filtering devices, Cisco Admission Control, remote access, intrusion prevention systems, and network appliances.
- Respond to reports of malware-infected computers following established SOPs and assist the relevant IT team with removal and cleanup.
- Ensure that security requests (Service Desk tickets) have proper approval in accordance with the Ministry of Finance framework.
- Act as an escalation point for users to resolve problems.
- Defend systems against unauthorized access, modification, and/or destruction.
- Conduct regular external and internal penetration testing, prepare reports, and ensure issue resolution.
- Perform vulnerability and penetration tests across all network segments.
- Resolve service interruptions or escalate them to the IT Security Supervisor, IT Superintendent, or IT Manager.
- Provide on-call support for network security and infrastructure.
- Coach and guide Service Desk Support technicians in their incident response, directing first responder actions, and appropriately escalating issues.
- Maintain system documentation and configuration data for regulatory and audit purposes.
- Ensure early detection and rapid response to unexpected “suspicious” situations (e.g., unusual traffic volume, port attacks, rogue devices in the network, etc.).
- Maintain all computers in good operating condition, protect each workstation from viruses, install antivirus software, and update it regularly.
- Operate network and security management software to identify security events, detect faults, correlate log events, measure performance metrics, and generate reports to support specific service level requirements.
- Administrate the SIEM solution to monitor and detect security incidents.
- Administrate and maintain end-user accounts, permissions, and access rights on authentication servers (AAA).
- Protect confidential data stored on users’ desktops and laptops from compromise.
- Research and recommend network and data communications hardware and software solutions.
Job Requirements
Experience
- 3 years’ experience in a similar role managing Cisco routers, switches, firewalls, and Windows systems.
- Previous experience with network infrastructure design, including routers, switch configuration, and IP telephony systems.
- Previous experience with one or more of the following firewalls: Palo Alto, Cisco, Firepower, and Kaspersky.
- Experience with network monitoring and management.
- ITIL experience would be well regarded.
Specific Job Skills
- Configuration of all security devices on LAN/WAN networks.
- Knowledge of L4–L7 protocols such as SSL, HTTP, DNS, SMTP, and IPSec.
- Experience monitoring security servers, firewalls, intrusion detection/prevention systems, WAF, SSL VPN, and network traffic for unusual or suspicious activity.
- Strong understanding of Cisco Identity Services Engine (ISE) and Cisco Firepower.
- Strong understanding of firewall technologies including Cisco, Palo Alto, and next-generation firewalls.
- Working knowledge of load balancers and proxy servers.
- Understanding of information management and data classification.
- Demonstrated understanding of VPNs and remote access.
- Experience with vulnerability scanning tools such as Qualys, Rapid7, OpenVAS, and Nessus.
- Experience configuring, deploying, and managing Endpoint Security/Antivirus suites.
- Knowledge of encryption techniques and PKI infrastructure.
- Experience with audits and accreditation processes.
- Familiarity with ITIL including system hardening, best practices, and change management
- Strong problem-solving skills.
- Ability to work effectively in a team environment.
- Output-driven and deadline-focused.
- Ability to handle multiple tasks simultaneously.
- Strong technical communication skills (verbal and written), proactive, and service-delivery focused.
- Disciplined time management.
- Methodical and systematic approach with strong problem-solving capability.
Job Location & Accommodation Arrangements:
• Sukari Gold Mines, Red Sea – Marsa Alam
• 20 days onsite / 10 days off
• Home-to-site transportation provided
• Full accommodation and well-being facilities provided