Security Device Management

Riyadh

Active

Key Responsibilities:
• Conduct regular vulnerability assessments and scans on networks, systems,
applications, and databases using industry-standard tools (e.g., Nessus, Qualys,
OpenVAS).
• Identify and classify vulnerabilities based on severity, impact, and exploitability.
• Analyze scan results and provide detailed reports on identified vulnerabilities.
• Work with IT, development, and operations teams to prioritize and remediate
identified vulnerabilities.
• Provide guidance and recommendations for mitigating vulnerabilities, including
patch management, configuration changes, and security updates.
• Track and verify the remediation of vulnerabilities to ensure effective resolution.
• Monitor security tools and systems for potential vulnerabilities and threats.
• Assist in the investigation and response to security incidents related to
vulnerabilities.
• Provide input into incident response plans and participate in incident response
activities as needed.
• Assess the risk associated with identified vulnerabilities and their potential impact
on the organization.
• Collaborate with the Risk Management team to integrate vulnerability assessment
results into the overall risk management framework.
• Develop and maintain metrics to measure the effectiveness of vulnerability
management efforts.
• Maintain accurate and up-to-date documentation of vulnerability assessment
activities, findings, and remediation efforts.
• Generate regular and ad-hoc reports for management, highlighting key
vulnerabilities, trends, and progress.
• Develop and maintain a vulnerability management dashboard for ongoing tracking
and reporting.
• Ensure that vulnerability management practices comply with relevant industry
regulations and standards (e.g., PCI-DSS, HIPAA, ISO 27001).
• Support audits and assessments by providing evidence of vulnerability
management activities and compliance.
• Enforce organizational policies related to vulnerability management and security
best practices.
• Stay current with the latest vulnerability assessment tools, techniques, and industry
trends.
• Recommend and implement improvements to the vulnerability management
process and toolset.
• Participate in security training and awareness programs to educate staff on
vulnerability management practices.
• Strong experience developing and implementing data classification policies,
standards, and guidelines.
• Regularly review and update classification criteria and policies to align with
organizational changes and compliance requirements.
• Strong experience in evaluating information security risks and implementing data
loss prevention measures (considered an asset).
• Ensure that data is classified correctly according to predefined categories (e.g.,
public, internal, confidential, restricted).
• Configure and manage data classification software settings to optimize
performance and accuracy.
• Troubleshoot and resolve any issues related to the Boldon James system.
• Monitor data classification activities to ensure compliance with policies and
standards.
• Generate and analyze reports on data classification status, trends, and potential
issues.
• Present findings and recommendations to management for improving data
classification practices.
• Configure detection and prevention rule to monitor network and system activity to
identify potential data leakage incidents.
• Generate and analyze reports on data classification status, data leakage incidents,
trends, and potential issues.
• Present findings and recommendations to management for improving data
classification and leakage prevention practices.
• Regularly review and update classification criteria and policies to align with
organizational changes and compliance requirements.
• Configure and maintain email gateway solutions to ensure secure and reliable email
delivery.
• Implement policies, rules, and filters to control and monitor email traffic.
• Implement and manage anti-spam, anti-phishing, and anti-malware measures.
• Continuously monitor email gateway performance, usage, and security logs.
• Generate and analyze reports on email traffic, threats detected, and system
performance.
• Present findings and recommendations to management for improving email security
and efficiency.

Skills:
• Strong understanding of common vulnerabilities and exposures (CVEs) and the
CVSS scoring system.
• Knowledge of network protocols, operating systems, and security configurations.
• Proficiency in using and interpreting vulnerability assessment tools and techniques.
• Excellent problem-solving and analytical skills.
• Strong communication and interpersonal skills, with the ability to explain technical
issues to non-technical stakeholders.
• Ability to work independently and as part of a team.
• Attention to detail and strong organizational skills.
• Strong understanding of data classification principles and data leakage prevention
techniques.
• Proficiency in using and configuring Boldon James software.
• Excellent problem-solving and analytical skills.
• Strong communication and interpersonal skills.
• Ability to work independently and as part of a team.
• Attention to detail and strong organizational skills.
• Strong understanding of email protocols (SMTP, IMAP, POP3) and email security
standards.
• Proficiency in configuring and managing email gateway solutions.
• Excellent problem-solving and analytical skills.
• Strong communication and interpersonal skills.
• Ability to work independently and as part of a team.
• Attention to detail and strong organizational skills.