Information Security Architect (Application) (Omani or GCC Nationals) – Ooredoo Group of Companies – Muscat

Information Security Architect (Application) (Omani or GCC Nationals) – Muscat – Indeed.com

“),r.close()),!r)throw Error(“base not supported”);var a=r.createElement(“base”);a.href=n,r.getElementsByTagName(“head”)[0].appendChild(a);var i=r.createElement(“a”);return i.href=t,i.href}finally{e&&e.parentNode.removeChild(e)}}());var l=i(t||””),f=function(){if(!(“defineProperties”in Object))return!1;try{var e={};return Object.defineProperties(e,{prop:{get:function(){return!0}}}),e.prop}catch(t){return!1}}(),h=f?this:document.createElement(“a”),m=new o(l.search?l.search.substring(1):null);return m._url_object=h,Object.defineProperties(h,{href:{get:function(){return l.href},set:function(e){l.href=e,r(),u()},enumerable:!0,configurable:!0},origin:{get:function(){return”origin”in l?l.origin:this.protocol+”//”+this.host},enumerable:!0,configurable:!0},protocol:{get:function(){return l.protocol},set:function(e){l.protocol=e},enumerable:!0,configurable:!0},username:{get:function(){return l.username},set:function(e){l.username=e},enumerable:!0,configurable:!0},password:{get:function(){return l.password},set:function(e){l.password=e},enumerable:!0,configurable:!0},host:{get:function(){var e={“http:”:/:80$/,”https:”:/:443$/,”ftp:”:/:21$/}[l.protocol];return e?l.host.replace(e,””):l.host},set:function(e){l.host=e},enumerable:!0,configurable:!0},hostname:{get:function(){return l.hostname},set:function(e){l.hostname=e},enumerable:!0,configurable:!0},port:{get:function(){return l.port},set:function(e){l.port=e},enumerable:!0,configurable:!0},pathname:{get:function(){return”/”!==l.pathname.charAt(0)?”/”+l.pathname:l.pathname},set:function(e){l.pathname=e},enumerable:!0,configurable:!0},search:{get:function(){return l.search},set:function(e){l.search!==e&&(l.search=e,r(),u())},enumerable:!0,configurable:!0},searchParams:{get:function(){return m},enumerable:!0,configurable:!0},hash:{get:function(){return l.hash},set:function(e){l.hash=e,r()},enumerable:!0,configurable:!0},toString:{value:function(){return l.toString()},enumerable:!1,configurable:!0},valueOf:{value:function(){return l.valueOf()},enumerable:!1,configurable:!0}}),h}var c,s=e.URL;try{if(s){if(“searchParams”in(c=new e.URL(“http://example.com”))){var f=new l(“http://example.com”);if(f.search=”a=1&b=2″,”http://example.com/?a=1&b=2″===f.href&&(f.search=””,”http://example.com/”===f.href))return}”href”in c||(c=undefined),c=undefined}}catch(m){}if(Object.defineProperties(o.prototype,{append:{value:function(e,t){this._list.push({name:e,value:t}),this._update_steps()},writable:!0,enumerable:!0,configurable:!0},”delete”:{value:function(e){for(var t=0;t1?arguments[1]:undefined;this._list.forEach(function(n){e.call(t,n.value,n.name)})},writable:!0,enumerable:!0,configurable:!0},toString:{value:function(){return r(this._list)},writable:!0,enumerable:!1,configurable:!0}}),”Symbol”in e&&”iterator”in e.Symbol&&(Object.defineProperty(o.prototype,e.Symbol.iterator,{value:o.prototype.entries,writable:!0,enumerable:!0,configurable:!0}),Object.defineProperty(u.prototype,e.Symbol.iterator,{value:function(){return this},writable:!0,enumerable:!0,configurable:!0})),s)for(var h in s)Object.prototype.hasOwnProperty.call(s,h)&&”function”==typeof s[h]&&(l[h]=s[h]);e.URL=l,e.URLSearchParams=o}(),function(){if(“1”!==new e.URLSearchParams([[“a”,1]]).get(“a”)||”1″!==new e.URLSearchParams({a:1}).get(“a”)){var r=e.URLSearchParams;e.URLSearchParams=function(e){if(e&&”object”==typeof e&&t(e)){var a=new r;return n(e).forEach(function(e){if(!t(e))throw TypeError();var r=n(e);if(2!==r.length)throw TypeError();a.append(r[0],r[1])}),a}return e&&”object”==typeof e?(a=new r,Object.keys(e).forEach(function(t){a.set(t,e[t])}),a):new r(e)}}}()}(self);}if (!(“Window”in self
)) {“undefined”==typeof WorkerGlobalScope&&”function”!=typeof importScripts&&function(o){o.constructor?o.Window=o.constructor:(o.Window=o.constructor=new Function(“return function Window() {}”)()).prototype=self}(self);}if (!((function(n){if(!(“Event”in n))return!1
try{return new Event(“click”),!0}catch(t){return!1}})(self)
)) {!function(){function e(e,t){if(!e)throw new Error(“Not enough arguments”);var n;if(“createEvent”in document){n=document.createEvent(“Event”);var o=!(!t||t.bubbles===undefined)&&t.bubbles,i=!(!t||t.cancelable===undefined)&&t.cancelable;return n.initEvent(e,o,i),n}return n=document.createEventObject(),n.type=e,n.bubbles=!(!t||t.bubbles===undefined)&&t.bubbles,n.cancelable=!(!t||t.cancelable===undefined)&&t.cancelable,n}var t={click:1,dblclick:1,keyup:1,keypress:1,keydown:1,mousedown:1,mouseup:1,mousemove:1,mouseover:1,mouseenter:1,mouseleave:1,mouseout:1,storage:1,storagecommit:1,textinput:1};if(“undefined”!=typeof document&&”undefined”!=typeof window){var n=window.Event&&window.Event.prototype||null;e.NONE=0,e.CAPTURING_PHASE=1,e.AT_TARGET=2,e.BUBBLING_PHASE=3,window.Event=Window.prototype.Event=e,n&&Object.defineProperty(window.Event,”prototype”,{configurable:!1,enumerable:!1,writable:!0,value:n}),”createEvent”in document||(window.addEventListener=Window.prototype.addEventListener=Document.prototype.addEventListener=Element.prototype.addEventListener=function o(){var e=this,n=arguments[0],o=arguments[1];if(e===window&&n in t)throw new Error(“In IE8 the event: “+n+” is not available on the window object. Please see https://github.com/Financial-Times/polyfill-service/issues/317 for more information.”);e._events||(e._events={}),e._events[n]||(e._events[n]=function(t){var n,o=e._events[t.type].list,i=o.slice(),r=-1,c=i.length;for(t.preventDefault=function a(){!1!==t.cancelable&&(t.returnValue=!1)},t.stopPropagation=function l(){t.cancelBubble=!0},t.stopImmediatePropagation=function s(){t.cancelBubble=!0,t.cancelImmediate=!0},t.currentTarget=e,t.relatedTarget=t.fromElement||null,t.target=t.target||t.srcElement||e,t.timeStamp=(new Date).getTime(),t.clientX&&(t.pageX=t.clientX+document.documentElement.scrollLeft,t.pageY=t.clientY+document.documentElement.scrollTop);++r-1)
)) {self.CustomEvent=function e(t,n){if(!t)throw Error(‘TypeError: Failed to construct “CustomEvent”: An event name must be provided.’);var l;if(n=n||{bubbles:!1,cancelable:!1,detail:null},”createEvent”in document)try{l=document.createEvent(“CustomEvent”),l.initCustomEvent(t,n.bubbles,n.cancelable,n.detail)}catch(a){l=document.createEvent(“Event”),l.initEvent(t,n.bubbles,n.cancelable),l.detail=n.detail}else l=new Event(t,n),l.detail=n&&n.detail||null;return l},CustomEvent.prototype=Event.prototype;}if (!(“document”in self&&”hidden”in document&&”visibilityState”in document
)) {!function(){function i(){document.hidden=document[t+”Hidden”],document.visibilityState=document[t+”VisibilityState”]}var t=document.webkitVisibilityState?”webkit”:document.mozVisibilityState?”moz”:null;t&&(i(),document.addEventListener(t+”visibilitychange”,function(){i(),document.dispatchEvent(new CustomEvent(“visibilitychange”))}))}();}if (!((function(){var n=!1
return document.documentElement.addEventListener(“focusin”,function(){n=!0}),document.documentElement.dispatchEvent(new Event(“focusin”)),n})()
)) {self.addEventListener(“focus”,function(e){e.target.dispatchEvent(new Event(“focusin”,{bubbles:!0,cancelable:!0}))},!0),self.addEventListener(“blur”,function(e){e.target.dispatchEvent(new Event(“focusout”,{bubbles:!0,cancelable:!0}))},!0);}if (!(“onhashchange”in self&&(null==self.onhashchange||”function”==typeof self.onhashchange)
)) {!function(n){function h(){a!==n.location.hash&&(a=n.location.hash,n.dispatchEvent(new Event(“hashchange”))),setTimeout(h,500)}var a=n.location.hash;n.onhashchange=function(){},h()}(self);}if (!(“XMLHttpRequest”in self&&”prototype”in self.XMLHttpRequest&&”addEventListener”in self.XMLHttpRequest.prototype
)) {!function(e,t){e.XMLHttpRequest=function s(){var e=this,n=e._request=t?new t:new ActiveXObject(“MSXML2.XMLHTTP.3.0”);n.onreadystatechange=function(){e.readyState=n.readyState;var t=4===e.readyState;e.response=e.responseText=t?n.responseText:null,e.status=t?n.status:null,e.statusText=t?n.statusText:null,e.dispatchEvent(new Event(“readystatechange”)),t&&e.dispatchEvent(new Event(“load”))},”onerror”in n&&(n.onerror=function(){e.dispatchEvent(new Event(“error”))})},e.XMLHttpRequest.UNSENT=0,e.XMLHttpRequest.OPENED=1,e.XMLHttpRequest.HEADERS_RECEIVED=2,e.XMLHttpRequest.LOADING=3,e.XMLHttpRequest.DONE=4;var n=e.XMLHttpRequest.prototype;n.addEventListener=e.addEventListener,n.removeEventListener=e.removeEventListener,n.dispatchEvent=e.dispatchEvent,n.abort=function r(){return this._request()},n.getAllResponseHeaders=function u(){return this._request.getAllResponseHeaders()},n.getResponseHeader=function i(e){return this._request.getResponseHeader(e)},n.open=function a(e,t){this._request.open(e,t,arguments[2],arguments[3],arguments[4])},n.overrideMimeType=function o(e){this._request.overrideMimeType(e)},n.send=function p(){this._request.send(0 in arguments?arguments[0]:null)},n.setRequestHeader=function d(e,t){this._request.setRequestHeader(e,t)}}(self,self.XMLHttpRequest);}})(‘object’ === typeof window && window || ‘object’ === typeof self && self || ‘object’ === typeof global && global || {});
//]]>

Job Description:

  • The individual will utilize a combination of business process analysis, technical process analysis and technical expertise to develop enterprise architectural security deliverable.
  • analyzes the relationships of the various IT components and business processes to define approaches that provide significant value to our organization by driving appropriate security strategies across various disciplines.
  • The individual will be working closely with key decision makers and business leaders as well as varying levels of technologists
  • Must have solid communication skills with all levels of an organization.
  • Person will be responsible for developing advanced enterprise security ideas aligned with key industry standards that can guide security offerings into the future.
  • Advise senior management on security risks.
  • Translate security risks to business impact.
  • Consult and facilitate delivery of Information Security strategic goals and take initiatives for organization.
  • Assists in the evaluation of overall risk for IT systems (including data), accounting for the people, processes, and technologies that provide security controls ,Architects, prioritizes, coordinates and communicates the choice of security technologies necessary to ensure a highly secure yet usable computing environment.
  • Provide security architecture and advice in support of application development, infrastructure, and enterprise technology projects.
  • Coordinate with various project teams to communicate the necessity of security requirements and design constraints.
  • Identify any gaps in existing application security infrastructure to meet project requirements.
  • Perform code analysis, application security reviews, and develop an application security training program.
  • Stays current with security technologies and make recommendations for use based on business value.
  • Maintains an expert knowledge in the field of Information Security and the related issues, systems, processes, products, and services.
  • Provide training and mentoring to team and consulting resources.

Qualifications/Skills

  • Solid history of designing, developing, or customizing application authentication and authorization systems.
  • Understanding of the OWASP Top 10 application security risks and how to address them.
  • Strong working knowledge of enterprise software technologies, application security, and infrastructure.
  • Hands on experience with encryption, hashing, secure random number generation, key derivation, key management, digital signatures, etc. in one or more major development languages.
  • Core understanding of web application security scanning software and related penetration testing tools
  • General knowledge of core security networking concepts like TLS, SSH, DNS, Firewalls etc.
  • Strong communication skills, both written and verbal.
  • Good presentation skills.
  • Ability to articulate technically advanced issues to all audiences.
  • Ability to mentor and train teams.
  • Ability to work under pressure, establish priorities and respond with urgency.

Education/ Experience

Min Experience : 2 Years

Bachelor’s degree or equivalent

Good to have : CISSP, CISSP – ISSAP, CEH etc.


Click here

WordPress Theme built by Shufflehound.