Role : Systems Security Development Specialist Location: Oman Experience: 8-14yrs Work experience in bank is a must. Designs, develops, and evaluates security of information systems throughout the development/ project life-cycle. Key Responsibilities:
Ensure that security requirements are incorporated in systems, applications and associated project documentation
Ensure that security design and cybersecurity development activities are appropriately documented.
Design to security requirements to ensure requirements are met for all systems and applications.
Design hardware, operating systems and software applications to address cybersecurity requirements.
Develop detailed security design documentation for component and interface specifications to support system design and development.
Support security certification test and evaluation activities.
Develop specific cybersecurity countermeasures and risk mitigation strategies to address cost, schedule, performance and security risks.
Perform security reviews and identify security gaps in architecture.
Verify stability, interoperability, portability and scalability of system architecture.
Develop security risk profiles of computer systems by assessing threats to, and vulnerabilities of, those systems.
Conduct Privacy Impact Assessments (PIAs) to ensure that Personally Identifiable Information (PII) is appropriately protected.
Ensure that any products implemented to manage cybersecurity risks have been effectively evaluated and authorized for use.
Perform risk analysis whenever an application or system undergoes a major change.
Provide input to the risk management framework and related documentation.
Carry out a cybersecurity risk assessment.
Ability:
Ability to communicate cybersecurity concepts and practices in an effective manner.
Ability to produce technical documentation at an appropriate level for the audience.
Ability to ensure cybersecurity practices are applied at all stages in the acquisition or divestment process.
Ability to design architectures and frameworks in line with security policies.
Ability to function in a collaborative environment to leverage analytical and technical expertise.
Ability to apply network security architecture concepts including topology, protocols, components and principles.
Ability to apply secure system design tools, methods and techniques.
Ability to analyse vulnerability and configuration data to identify cybersecurity issues.
Ability to relate basic cybersecurity concepts to the impact they may have on an organization.
Ability to apply cybersecurity and privacy principles to organizational requirements.
Ability to identify critical information systems which have limited technical cybersecurity controls.
Ability to apply the organization's chosen framework for describing, analysing and documenting its IT architecture.
Ability to collaborate effectively with others.
Ability to ask questions for clarification of cybersecurity matters.
Ability to understand organizational objectives and the effects of cybersecurity controls on those objectives.
Ability to assure business and system continuity and mitigate the risks of cybersecurity incidents.
Skills:
Skill in evaluating the adequacy of security designs.
Skill in designing the integration of hardware and software solutions.
Skill in conducting cybersecurity audits or reviews of technical systems.
Skill in designing countermeasures to identified security risks.
Skill in applying cybersecurity and privacy principles to organizational requirements.
Skill in designing security controls based on cybersecurity principles and tenets.
Skill in developing and applying security system access controls.
Skill in determining the security control requirements of information systems and networks.
Skill in the use of design modelling.
Knowledge
Knowledge and understanding of risk assessment, mitigation and management methods.
Knowledge of relevant cybersecurity aspects of legislative and regulatory requirements, relating to ethics and privacy.
Knowledge of cybersecurity related threats and vulnerabilities.
Knowledge of encryption algorithms, their relative strengths and weaknesses and appropriate selection criteria.
Knowledge of cybersecurity considerations for database systems.
Knowledge of human-computer interaction principles.
Knowledge of IT security principles and methods.
Knowledge of policy-based and risk adaptive access controls.
Knowledge of how to carry out privacy impact assessments.
Knowledge of all aspects of system lifecycle management.
Knowledge of network security architecture concepts including topology, protocols, components, and principles.
Knowledge of network design processes, including security objectives, operational objectives and trade-offs.
Knowledge of service management concepts for networks and related standards.
Knowledge of industry standard security models and their effective application.
Knowledge of data security standards relating to personally identifiable information.
Knowledge of Payment Card Industry Data Security Standards (PCI-DSS).
Knowledge of countermeasure design for identified security risks.
Knowledge of access authentication methods.
Knowledge of how to use resiliency and redundancy to mitigate cybersecurity risks.
Knowledge of national and organizational document and information classification and marking standards, policies and procedures.
Experience 5 years in information security governance, risk and compliance role managing projects. Education Bachelors/Masters in Information Security related field Desired Certifications CISSP, CISM, ISO27001, PCI-DSS Job Type: Full-time Application Question(s):