Dicetek LLC
Systems Security Operations Engineer
Dicetek LLCUnited Arab Emirates5 hours ago
ContractInformation Technology
Qualification

Essential:

  • Bachelor’s degree in computer science or relevant field
  • MCSE, MCSA 2019
  • CCNA
  • MS Azure Administrator
  • Office 365 expert
  • VMware VCP
  • Linux Redhat
  • Minimum 7 years of experience in System and Security operations field

Desirable

  • ITIL certified.

Essential

Server Hardening and Benchmarking:

  • Define the benchmarking standards for the endpoint and server environments.
  • Implement and enforce security configurations aligning to benchmarks for server’s endpoint and minimize security exposure.
  • Disable unnecessary services and features to reduce the attack surface.
  • Regularly apply security patches and updates to all endpoints to address known vulnerabilities.
  • Develop and maintain a patch management strategy to ensure timely updates.
  • Ensure legacy services, protocols and vulnerable services are not in use.
  • Support regular vulnerability assessments on servers.
  • Enforce and implement strong identity and privilege access controls.
  • Manage RBAC and permissions on servers and application environment.
  • Implement strong authentication mechanisms, such as multi-factor authentication (MFA).
  • Ensure periodic reconciliation of security controls services for infrastructure services.
  • Enforce conditional access to all critical SaaS, PaaS & IaaS services.
  • Execute and remediate all the gaps as per the VAPT report.
  • Review the existing GPO’s and apply the latest and up to date security baseline.
  • Ability to remediate the weak ciphers for the instances running on all environments (On-prem & Cloud)
  • Review all the existing delegated permissions across all systems and advise for the recommended actions.
  • Ability to manage the Linux Redhat OS and do a proper patching and hardening.
  • Ability to fix and remediate the gaps appeared on VMware environment.

Security Monitoring And Analysis

  • Ensure security logging and auditing is enabled on all the infrastructure components at server and application level.
  • Analyse security alerts and take appropriate action to mitigate threats.

Cryptographic Controls

  • Enforce strict encryption controls for all services and data at rest and in transit.
  • Manage key vaults and certificates with robust security practices.
  • Ensure all key management is audited and logged and managed with adequate approval workflows.

Interpersonal Skills

  • - Can-Do/Will-Do Attitude
  • - Committed to achieve
  • - Continuous development
  • - Quick learning
  • - Team player
  • - Ability to work with the least supervision

Duties



  • Lead, deliver, implement, and maintain end-to-end system, and security infrastructure solutions utilizing new technologies, including on prem and cloud solutions.
  • Desing and maintain security posture and resilient System, throughout the entire systems and security landscape.
  • Recommend and Drive recommended changes as needed in response to technology trends, business needs or audits.
  • Undertake projects workload and while ensuring necessary deliverables are achieved within agreed project time and cost constraints, ensuring closure and design documentations availability and accuracy.
  • Carry out routine maintenance, failover tests, and drills to continuously monitor the systems against established thresholds and BCP benchmarks.
  • Perform proactive incident response and closure within SLAs and maintaining RCAs and KBs
  • Assist with development and management of the System and security budgets.
  • Align with IT risk management initiatives and Internal/External corporate audit.

Key Skills

Ranked by relevance