Black Swan Group
Information Technology Infrastructure & Cybersecurity Lead
Black Swan GroupUnited Arab Emirates10 hours ago
Full-timeRemote FriendlyInformation Technology

IT Infrastructure & Cybersecurity Lead/in house IT Lead

Overview

A private Family Office is seeking a trusted IT infrastructure and cybersecurity professional or specialist provider to design, implement, and maintain a secure and discreet technology environment.

The organization is small (approximately 5–6 users) and operates in a security-sensitive context, requiring a highly reliable, privacy-focused, and right-sized IT architecture aligned with established cybersecurity best practices.

The selected partner will provide end-to-end services, including infrastructure design, procurement guidance, implementation, migration, documentation, user training, and ongoing system management.

Scope of Responsibilities

Secure Infrastructure Design

  • Design and deploy a secure IT architecture suitable for a small, security-focused environment, either:
  • On-premises server infrastructure located at the office, or
  • Dedicated single-tenant hosted infrastructure (no shared multi-tenant systems).
  • Oversee system configuration, data migration, and secure environment setup.

Secure Communications & Information Management

  • Implement secure email with encryption in transit and a defined approach to message-level encryption where appropriate.
  • Deploy secure file storage with encryption at rest, role-based access controls, activity auditing, and secure remote access.
  • Implement a secure, encrypted messaging platform hosted within the environment.

Business System Integration

  • Implement or securely integrate an accounting solution in coordination with the financial controller.

Device & Endpoint Management

  • Establish device provisioning and lifecycle management for Windows, macOS, iOS, and Android.
  • Implement centralized device management, configuration standards, and compliance controls.

Identity & Network Security

  • Implement identity and access management controls including:
  • Multi-factor authentication for all users and privileged accounts
  • Role-based access controls
  • Configure secure networking including firewall, VPN, and remote access capabilities.
  • Deploy a secure password management platform with controlled credential sharing.

Security Monitoring & Incident Response

  • Implement centralized logging, monitoring, and security alerting.
  • Establish a defined incident response process.

System Maintenance & Resilience

  • Manage patching and system maintenance across infrastructure and endpoints.
  • Implement backup, disaster recovery, and business continuity procedures appropriate for the organization.

Deliverables

  • Secure infrastructure architecture and implementation
  • Migration and system configuration documentation
  • Security and operational procedures
  • User onboarding and training
  • Ongoing monitoring, maintenance, and managed services

Ideal Profile

  • Demonstrated experience supporting family offices, private investment offices, or similarly security-sensitive organizations.
  • Strong expertise in secure infrastructure design, endpoint management, and cybersecurity best practices.
  • Ability to deliver discreet, reliable, and end-to-end IT support in a small, high-trust environment.

Key Skills

Ranked by relevance