Job Description

Reputed IT company in Bahrain

Free placement

Information Systems Security Engineer

Bookmark and Share

Job id: 238487

01 Aug 2018

Job Location

Manama, Bahrain


4 to 8 years

Qualification Level

Graduate; Engineering Graduates/PG

Job Function

IT - Hardware
IT - Software



Jobseeker Nationality

Jobseekers from any Asian countries

1. The Ministry's internal information security efforts are consistent with Syriac Security Governance Policy requirements and other international best practices (eg ISO 27000, etc.).
2. Define the objectives of protection and objectives consistent with the comprehensive strategic plan for the information systems of the Ministry, Information Authority and e-government.
3. Participates in efforts to develop and develop the "Disaster Plan / DR", "Business Continuity Plan" and "System Enforce Plan", as well as business continuity monitoring and compliance.
4. Prepare, coordinate, manage and implement the document security policy in the Ministry of Security through standards, recommendations and procedures to ensure continuous security maintenance.
5. Prepare and maintain the Information Security Strategy and the Official Procedures Manual.

6. Combines information to assess risks associated with the Ministry's Information Security Threats and Secure Data Procedures. 7. The MOJ Information Security Plan is developed for employees, departments and systems. With the implementation of security technologies to measure plans, products and controls to monitor the effectiveness of information security and improve productivity Measurements & KPIs. 8. Prepares, implements and follows a campaign to educate the Ministry's employees and clients on the laws related to information security in all available and modern means of communication and communication to reach all target audiences.
10. The MOJ Information Security Awareness Program (MOJ) prepares and provides training for MOE staff and users in information security.
11. Development ideas that serve information security in the ministry are proposed at the lowest cost and highest quality.
12. Reports on the compliance of employees of each Department of the Ministry with MOJ Staff Obeying Report.
13. Prepare, execute, and lead the Emergency Information Security Team to contain, investigate, and prevent future violations of the Ministry's information.
14. Following closely the news and information of those involved in the information security violations, and making sure that they do not reach the Ministry's information.
15. Reacts quickly with warnings and requests from the CERT team and applies the requirements as soon as possible, and follows up with the Head of Technical Support and the Information Systems Manager with results and follow-ups.
16. Continues with the Ministry with engineers and technicians in the technical support department and developers and programmers in the application development department in the field of information security to ensure compliance with their procedures and technical production of the laws and security rules IT Staff Obeying Report.
17. Supervises, coordinates and manages ethical hacking and infra-structure testing in the Ministry.
18. Works with external consultants as appropriate for independent security audits.
19. An annual report is submitted to the Chief of the Technical Support Section and the Director of Information Systems on the progress of the Information Security Program in the Ministry.
20. The need to obtain the security of network information on the certificate Professional: Cisco Certified Network Security Assistant (CCNA Security).
21. The need to obtain information security engineering on one of the following professional certificates:
a. Certified Information Security Professional (CISSP).
b. Certified Information Security Manager (CISM).
c. Information Security Professional (CompTIA).
d. Certified Ethical Breaker (CEH).
22. It is preferable to obtain information security audits on one of the following professional certificates:
a. Certified Information Security Checker (CISA).
b. Certified Information Systems Framework (COBIT 5).
22. Professional knowledge of information security and relative knowledge in security, physical and environmental security personnel, protection management, identity and access to critical infrastructure, incident response, business continuity planning, disaster recovery and program planning.
23. Demonstrated skills and real situations by implementing risk management programs, including implementation of risk assessments, identification and implementation of missing information controls, and management of ethical penetration testing.

24. The promptness of the procedures for any case of information security and good selection of the appropriate procedure in each case, with the proper communication with the management of information systems, depending on the importance of the case. 25. Mastering the English language (speaking - writing - reading), additional Arabic language. 26. Has the ability to communicate with technicians and non-technicians, each according to the appropriate method of understanding. 27. Communicate with staff of information systems and others with the required information or procedures in a timely manner. 28. Be proficient in using the Microsoft Office software package for texts, tables, reports, and presentations. 29. Tasks Management skills including time management, work within a team, workload allocation, ability to work under great pressure.
30. Experience in the preparation and supervision of information security programs, policy frameworks, compliance with information security standards, risk management programs, ISO 27001, trust programs, awareness and training programs, security standards from the Information and e-Government Authority . 31. Without the necessary authorization, the employee is not entitled to disclose the employee, nature and place of work, or to report any confidential information, including details of the client, to any other parties, during or after the period of employment. 32. The employee should comply with all relevant information security policies in the Government of the Kingdom of Bahrain. 33. The employee should ensure the use of resources and assets of the Ministry, materials and equipment in an ethical and legal manner.

34. The staff member should submit continuous reports on all security matters to the Chief of the Technical Support Section and the Director of Information Systems Management, as soon as possible. 35. The confidentiality of information, transactions, activities and anything related to the Ministry shall be kept confidential and shall not be disclosed in any way to any person, institution or institution, except by an official statement written by the Ministry represented by the Department of Information Systems.

Company Profile

Government of India licensed recruiting agency based in New Delhi. Recruiting all types of professionals and workforce with main clients in the Middle East. Recruiting for Oil & Gas, Construction, Trading & Contracting, Hotel & Hospitality, IT and Healthcare sectors.

Disclaimer: GotoGulf is a platform that facilitates recruiters and jobseekers reach out to each other. Applicants are advised to research the bonafides of recruiters independently. We do not endorse requests for money payments and strictly advise against sharing personal or financial information. If you suspect malpractice, please email to us.