Browse Jobs
For Companies
Log inGet Started
Logo

IT Security Administrator

Sukari Gold Mines
Red Sea, Egypt
Sukari Gold Mines logo

IT Security Administrator

Red Sea, Egyptposted 11 hours ago
5Applicants for1 open position
  • 0Viewed
  • 0In Consideration
  • 0Not Selected

Job Details

Experience Needed:
Career Level:
Education Level:
Salary:
Job Categories:

Skills And Tools:

Job Description

  • Configure, deploy, and maintain the state enterprise security infrastructure.
  • Implement firewall solutions to properly secure state data and provide consultation on all new firewall implementations, firewall configuration changes, and projects requiring security operational support.
  • Analyze problems, recommend solutions, products, and technologies to meet business objectives.
  • Assist with security breach investigations to guide the refinement of information security policies and practices.
  • Work with project teams to design and implement secure network connectivity solutions.
  • Implement network security policies, application security, access control, and corporate data safeguards.
  • Develop and update business continuity and disaster recovery protocols.
  • Conduct security audits and make policy recommendations.
  • Identify threats and work to create steps to defend against them.
  • Configure security systems such as firewalls, antivirus, and IDS/IPS software.
  • Analyze current security requirements and make suggestions for improvements.
  • Manage the allocation of access privileges of users to ensure appropriate security settings are applied in accordance with organization policies and application owner-defined parameters.
  • Manage the periodic maintenance of security systems and applications to ensure new threats are identified and managed, and the security of the organization’s assets is maintained.
  • Implement and monitor network security.
  • Maintain network security: add, remove, and change authorities for network users.
  • Serve as a secondary technical point of contact for network outages.
  • Document all changes to system security for auditing purposes.
  • Construct and maintain configurations for data security networks, VPN, and VOIP.
  • Review recurring patches from vendors including Microsoft, Cisco, and other third-party software before implementation.
  • Completely block unwanted websites to ensure employees stay focused on their daily tasks and goals.
  • Actively protect state information technology assets and infrastructure from external or internal threats and ensure compliance with statutory and regulatory requirements regarding information access, security, and privacy.
  • Monitor and report on the performance of network, servers, databases, and applications to ensure optimal availability and reliability.
  • Identify bottlenecks and performance issues, and recommend or implement corrective measures.
  • Ensure proactive detection and resolution of potential network performance and security issues.
  • Provide performance reports and metrics to management for continuous improvement of IT infrastructure.
  • Monitor and report on the performance of networks, system, and application security solutions to highlight areas of non-compliance and inform the development of improved practices and processes.
  • Conduct regular (daily, weekly, quarterly) reviews of logs, alerts, and scan results, and generate reports and presentations.
  • Provide support for Cisco firewalls, Palo Alto firewalls, VPNs, website filtering devices, Cisco Admission Control, remote access, intrusion prevention systems, and network appliances.
  • Respond to reports of malware-infected computers following established SOPs and assist the relevant IT team with removal and cleanup.
  • Ensure that security requests (Service Desk tickets) have proper approval in accordance with the Ministry of Finance framework.
  • Act as an escalation point for users to resolve problems.
  • Defend systems against unauthorized access, modification, and/or destruction.
  • Conduct regular external and internal penetration testing, prepare reports, and ensure issue resolution.
  • Perform vulnerability and penetration tests across all network segments.
  • Resolve service interruptions or escalate them to the IT Security Supervisor, IT Superintendent, or IT Manager.
  • Provide on-call support for network security and infrastructure.
  • Coach and guide Service Desk Support technicians in their incident response, directing first responder actions, and appropriately escalating issues.
  • Maintain system documentation and configuration data for regulatory and audit purposes.
  • Ensure early detection and rapid response to unexpected “suspicious” situations (e.g., unusual traffic volume, port attacks, rogue devices in the network, etc.).
  • Maintain all computers in good operating condition, protect each workstation from viruses, install antivirus software, and update it regularly.
  • Operate network and security management software to identify security events, detect faults, correlate log events, measure performance metrics, and generate reports to support specific service level requirements.
  • Administrate the SIEM solution to monitor and detect security incidents.
  • Administrate and maintain end-user accounts, permissions, and access rights on authentication servers (AAA).
  • Protect confidential data stored on users’ desktops and laptops from compromise.
  • Research and recommend network and data communications hardware and software solutions.

Job Requirements

Experience

  • 3 years’ experience in a similar role managing Cisco routers, switches, firewalls, and Windows systems.
  • Previous experience with network infrastructure design, including routers, switch configuration, and IP telephony systems.
  • Previous experience with one or more of the following firewalls: Palo Alto, Cisco, Firepower, and Kaspersky.
  • Experience with network monitoring and management.
  • ITIL experience would be well regarded.

 Specific Job Skills

  • Configuration of all security devices on LAN/WAN networks.
  • Knowledge of L4–L7 protocols such as SSL, HTTP, DNS, SMTP, and IPSec.
  • Experience monitoring security servers, firewalls, intrusion detection/prevention systems, WAF, SSL VPN, and network traffic for unusual or suspicious activity.
  • Strong understanding of Cisco Identity Services Engine (ISE) and Cisco Firepower.
  • Strong understanding of firewall technologies including Cisco, Palo Alto, and next-generation firewalls.
  • Working knowledge of load balancers and proxy servers.
  • Understanding of information management and data classification.
  • Demonstrated understanding of VPNs and remote access.
  • Experience with vulnerability scanning tools such as Qualys, Rapid7, OpenVAS, and Nessus.
  • Experience configuring, deploying, and managing Endpoint Security/Antivirus suites.
  • Knowledge of encryption techniques and PKI infrastructure.
  • Experience with audits and accreditation processes.
  • Familiarity with ITIL including system hardening, best practices, and change management
  • Strong problem-solving skills.
  • Ability to work effectively in a team environment.
  • Output-driven and deadline-focused.
  • Ability to handle multiple tasks simultaneously.
  • Strong technical communication skills (verbal and written), proactive, and service-delivery focused.
  • Disciplined time management.
  • Methodical and systematic approach with strong problem-solving capability.

 

Job Location & Accommodation Arrangements:
• Sukari Gold Mines, Red Sea – Marsa Alam
• 20 days onsite / 10 days off
• Home-to-site transportation provided
• Full accommodation and well-being facilities provided

 

Similar Jobs

Search other opportunities
JobInstallation/Maintenance/RepairIT Security Administrator
Employers and Recruiters, go to our RECRUITMENT SERVICES.
Members Directory:
abcdefghijklmnopqrstuvwxyz#

Links

BlogAbout UsRecruitment ServicesRSSJobs in Saudi ArabiaJobs in UAEJob DescriptionsPartnersSitemapContact UsPrivacy, Cookies, Terms & Conditionsوظائف مصر
© 2025 WUZZUF. All Rights Reserved. Owned by BasharSoft LLC.