Information Security Architect (Network) (Omani or GCC Nationals) – Ooredoo Group of Companies – Muscat

Information Security Architect (Network) (Omani or GCC Nationals) – Muscat – Indeed.com

“),r.close()),!r)throw Error(“base not supported”);var a=r.createElement(“base”);a.href=n,r.getElementsByTagName(“head”)[0].appendChild(a);var i=r.createElement(“a”);return i.href=t,i.href}finally{e&&e.parentNode.removeChild(e)}}());var l=i(t||””),f=function(){if(!(“defineProperties”in Object))return!1;try{var e={};return Object.defineProperties(e,{prop:{get:function(){return!0}}}),e.prop}catch(t){return!1}}(),h=f?this:document.createElement(“a”),m=new o(l.search?l.search.substring(1):null);return m._url_object=h,Object.defineProperties(h,{href:{get:function(){return l.href},set:function(e){l.href=e,r(),u()},enumerable:!0,configurable:!0},origin:{get:function(){return”origin”in l?l.origin:this.protocol+”//”+this.host},enumerable:!0,configurable:!0},protocol:{get:function(){return l.protocol},set:function(e){l.protocol=e},enumerable:!0,configurable:!0},username:{get:function(){return l.username},set:function(e){l.username=e},enumerable:!0,configurable:!0},password:{get:function(){return l.password},set:function(e){l.password=e},enumerable:!0,configurable:!0},host:{get:function(){var e={“http:”:/:80$/,”https:”:/:443$/,”ftp:”:/:21$/}[l.protocol];return e?l.host.replace(e,””):l.host},set:function(e){l.host=e},enumerable:!0,configurable:!0},hostname:{get:function(){return l.hostname},set:function(e){l.hostname=e},enumerable:!0,configurable:!0},port:{get:function(){return l.port},set:function(e){l.port=e},enumerable:!0,configurable:!0},pathname:{get:function(){return”/”!==l.pathname.charAt(0)?”/”+l.pathname:l.pathname},set:function(e){l.pathname=e},enumerable:!0,configurable:!0},search:{get:function(){return l.search},set:function(e){l.search!==e&&(l.search=e,r(),u())},enumerable:!0,configurable:!0},searchParams:{get:function(){return m},enumerable:!0,configurable:!0},hash:{get:function(){return l.hash},set:function(e){l.hash=e,r()},enumerable:!0,configurable:!0},toString:{value:function(){return l.toString()},enumerable:!1,configurable:!0},valueOf:{value:function(){return l.valueOf()},enumerable:!1,configurable:!0}}),h}var c,s=e.URL;try{if(s){if(“searchParams”in(c=new e.URL(“http://example.com”))){var f=new l(“http://example.com”);if(f.search=”a=1&b=2″,”http://example.com/?a=1&b=2″===f.href&&(f.search=””,”http://example.com/”===f.href))return}”href”in c||(c=undefined),c=undefined}}catch(m){}if(Object.defineProperties(o.prototype,{append:{value:function(e,t){this._list.push({name:e,value:t}),this._update_steps()},writable:!0,enumerable:!0,configurable:!0},”delete”:{value:function(e){for(var t=0;t1?arguments[1]:undefined;this._list.forEach(function(n){e.call(t,n.value,n.name)})},writable:!0,enumerable:!0,configurable:!0},toString:{value:function(){return r(this._list)},writable:!0,enumerable:!1,configurable:!0}}),”Symbol”in e&&”iterator”in e.Symbol&&(Object.defineProperty(o.prototype,e.Symbol.iterator,{value:o.prototype.entries,writable:!0,enumerable:!0,configurable:!0}),Object.defineProperty(u.prototype,e.Symbol.iterator,{value:function(){return this},writable:!0,enumerable:!0,configurable:!0})),s)for(var h in s)Object.prototype.hasOwnProperty.call(s,h)&&”function”==typeof s[h]&&(l[h]=s[h]);e.URL=l,e.URLSearchParams=o}(),function(){if(“1”!==new e.URLSearchParams([[“a”,1]]).get(“a”)||”1″!==new e.URLSearchParams({a:1}).get(“a”)){var r=e.URLSearchParams;e.URLSearchParams=function(e){if(e&&”object”==typeof e&&t(e)){var a=new r;return n(e).forEach(function(e){if(!t(e))throw TypeError();var r=n(e);if(2!==r.length)throw TypeError();a.append(r[0],r[1])}),a}return e&&”object”==typeof e?(a=new r,Object.keys(e).forEach(function(t){a.set(t,e[t])}),a):new r(e)}}}()}(self);}if (!(“Window”in self
)) {“undefined”==typeof WorkerGlobalScope&&”function”!=typeof importScripts&&function(o){o.constructor?o.Window=o.constructor:(o.Window=o.constructor=new Function(“return function Window() {}”)()).prototype=self}(self);}if (!((function(n){if(!(“Event”in n))return!1
try{return new Event(“click”),!0}catch(t){return!1}})(self)
)) {!function(){function e(e,t){if(!e)throw new Error(“Not enough arguments”);var n;if(“createEvent”in document){n=document.createEvent(“Event”);var o=!(!t||t.bubbles===undefined)&&t.bubbles,i=!(!t||t.cancelable===undefined)&&t.cancelable;return n.initEvent(e,o,i),n}return n=document.createEventObject(),n.type=e,n.bubbles=!(!t||t.bubbles===undefined)&&t.bubbles,n.cancelable=!(!t||t.cancelable===undefined)&&t.cancelable,n}var t={click:1,dblclick:1,keyup:1,keypress:1,keydown:1,mousedown:1,mouseup:1,mousemove:1,mouseover:1,mouseenter:1,mouseleave:1,mouseout:1,storage:1,storagecommit:1,textinput:1};if(“undefined”!=typeof document&&”undefined”!=typeof window){var n=window.Event&&window.Event.prototype||null;e.NONE=0,e.CAPTURING_PHASE=1,e.AT_TARGET=2,e.BUBBLING_PHASE=3,window.Event=Window.prototype.Event=e,n&&Object.defineProperty(window.Event,”prototype”,{configurable:!1,enumerable:!1,writable:!0,value:n}),”createEvent”in document||(window.addEventListener=Window.prototype.addEventListener=Document.prototype.addEventListener=Element.prototype.addEventListener=function o(){var e=this,n=arguments[0],o=arguments[1];if(e===window&&n in t)throw new Error(“In IE8 the event: “+n+” is not available on the window object. Please see https://github.com/Financial-Times/polyfill-service/issues/317 for more information.”);e._events||(e._events={}),e._events[n]||(e._events[n]=function(t){var n,o=e._events[t.type].list,i=o.slice(),r=-1,c=i.length;for(t.preventDefault=function a(){!1!==t.cancelable&&(t.returnValue=!1)},t.stopPropagation=function l(){t.cancelBubble=!0},t.stopImmediatePropagation=function s(){t.cancelBubble=!0,t.cancelImmediate=!0},t.currentTarget=e,t.relatedTarget=t.fromElement||null,t.target=t.target||t.srcElement||e,t.timeStamp=(new Date).getTime(),t.clientX&&(t.pageX=t.clientX+document.documentElement.scrollLeft,t.pageY=t.clientY+document.documentElement.scrollTop);++r-1)
)) {self.CustomEvent=function e(t,n){if(!t)throw Error(‘TypeError: Failed to construct “CustomEvent”: An event name must be provided.’);var l;if(n=n||{bubbles:!1,cancelable:!1,detail:null},”createEvent”in document)try{l=document.createEvent(“CustomEvent”),l.initCustomEvent(t,n.bubbles,n.cancelable,n.detail)}catch(a){l=document.createEvent(“Event”),l.initEvent(t,n.bubbles,n.cancelable),l.detail=n.detail}else l=new Event(t,n),l.detail=n&&n.detail||null;return l},CustomEvent.prototype=Event.prototype;}if (!(“document”in self&&”hidden”in document&&”visibilityState”in document
)) {!function(){function i(){document.hidden=document[t+”Hidden”],document.visibilityState=document[t+”VisibilityState”]}var t=document.webkitVisibilityState?”webkit”:document.mozVisibilityState?”moz”:null;t&&(i(),document.addEventListener(t+”visibilitychange”,function(){i(),document.dispatchEvent(new CustomEvent(“visibilitychange”))}))}();}if (!((function(){var n=!1
return document.documentElement.addEventListener(“focusin”,function(){n=!0}),document.documentElement.dispatchEvent(new Event(“focusin”)),n})()
)) {self.addEventListener(“focus”,function(e){e.target.dispatchEvent(new Event(“focusin”,{bubbles:!0,cancelable:!0}))},!0),self.addEventListener(“blur”,function(e){e.target.dispatchEvent(new Event(“focusout”,{bubbles:!0,cancelable:!0}))},!0);}if (!(“onhashchange”in self&&(null==self.onhashchange||”function”==typeof self.onhashchange)
)) {!function(n){function h(){a!==n.location.hash&&(a=n.location.hash,n.dispatchEvent(new Event(“hashchange”))),setTimeout(h,500)}var a=n.location.hash;n.onhashchange=function(){},h()}(self);}if (!(“XMLHttpRequest”in self&&”prototype”in self.XMLHttpRequest&&”addEventListener”in self.XMLHttpRequest.prototype
)) {!function(e,t){e.XMLHttpRequest=function s(){var e=this,n=e._request=t?new t:new ActiveXObject(“MSXML2.XMLHTTP.3.0”);n.onreadystatechange=function(){e.readyState=n.readyState;var t=4===e.readyState;e.response=e.responseText=t?n.responseText:null,e.status=t?n.status:null,e.statusText=t?n.statusText:null,e.dispatchEvent(new Event(“readystatechange”)),t&&e.dispatchEvent(new Event(“load”))},”onerror”in n&&(n.onerror=function(){e.dispatchEvent(new Event(“error”))})},e.XMLHttpRequest.UNSENT=0,e.XMLHttpRequest.OPENED=1,e.XMLHttpRequest.HEADERS_RECEIVED=2,e.XMLHttpRequest.LOADING=3,e.XMLHttpRequest.DONE=4;var n=e.XMLHttpRequest.prototype;n.addEventListener=e.addEventListener,n.removeEventListener=e.removeEventListener,n.dispatchEvent=e.dispatchEvent,n.abort=function r(){return this._request()},n.getAllResponseHeaders=function u(){return this._request.getAllResponseHeaders()},n.getResponseHeader=function i(e){return this._request.getResponseHeader(e)},n.open=function a(e,t){this._request.open(e,t,arguments[2],arguments[3],arguments[4])},n.overrideMimeType=function o(e){this._request.overrideMimeType(e)},n.send=function p(){this._request.send(0 in arguments?arguments[0]:null)},n.setRequestHeader=function d(e,t){this._request.setRequestHeader(e,t)}}(self,self.XMLHttpRequest);}})(‘object’ === typeof window && window || ‘object’ === typeof self && self || ‘object’ === typeof global && global || {});
//]]>

Job Description

  • Responsible for designing and overseeing the building and configuration of secure enterprise network systems.
  • At the most fundamental level, this involves segregating networks into the appropriate trust domains, a compartmentalization technique that involves using access controls to place only the appropriate users and data on the same system segments together.
  • Apply access control mechanisms to accomplish various tasks that includes: Role-based Access Control (RBAC) ,Mandatory Access Control (MAC) Discretionary Access Control (DAC)
  • Responsible for analyzing network data and systems to select the most appropriate control mechanism for the security required.
  • Manage in selecting software and hardware used to apply the control system.
  • Manage and control Physical security of network elements, like routers and switches ,etc.
  • Established Frameworks, Process Models, and Interactions with Users
  • Make use of ITIL (Information Technology Infrastructure Library) and COBIT (Control Objectives for Information and Related Technologies) process models where applicable .
  • Ensure the IT departments responsible for managing the architecture can deliver the specified services with the appropriate level of availability and performance.
  • Define policies and procedures appropriate to the systems and help educate users and administrators.
  • Take part in ongoing role in auditing and supervising security levels specific to the systems organization have designed.
  • Regular interaction with other business divisions to help integrate their business requirements into the planning and implementation of the network security architecture.
  • Must be able to articulate their knowledge of security considerations both verbally and in writing and must work within budget and operational constraints to secure systems without destroying their efficiency.

Education/ Experience

Min experience: 2 years

Qualifications: Bachelor’s in information security or equivalent.

Must have : Any one of CISSP or ISSAP

Min Experience: 2 Years

Bachelor’s in information security or equivalent.

Must have: Any one of CISSP or ISSAP

Min Experience: 2 Years

Bachelor’s in information security or equivalent.

Must have: Any one of CISSP or ISSAP

Min Experience: 2 Years

Bachelor’s in information security or equivalent.

Must have: Any one of CISSP or ISSAP

Min Experience: 2 Years

Bachelor’s in information security or equivalent.

Must have: Any one of CISSP or ISSAP

Behavioral Skills Required

  • Communicating Effectively
  • Planning & Organizing
  • Risk Aware
  • Teamwork
  • Results Orientation


Click here

WordPress Theme built by Shufflehound.