Chief Cybersecurity Strategist
تفاصيل الوظيفة
About the Role We are seeking a seasoned Chief Cybersecurity Strategist to join our team at Bahrain Airport Company. In this critical role, you will be responsible for developing and implementing robust cybersecurity strategies to protect our organization's sensitive resources. Key Responsibilities
- Conduct thorough security audits to identify vulnerabilities and implement actionable improvements.
- Develop and enforce Privilege Access Management (PAM) strategies to safeguard sensitive data and systems.
- Create and maintain Security Hardening Guidelines in compliance with industry standards, ensuring secure configurations across all systems.
- Design and deploy automated processes for cybersecurity tasks using Python scripting.
- Manage the organization's Vulnerability Management Program, including regular scanning, assessment, remediation, and reporting.
- Implement and oversee Security Automation processes to streamline threat detection, incident response, and compliance checks.
- Continuously monitor security systems to detect, respond to, and resolve potential incidents promptly.
- Respond to cybersecurity incidents with effective containment, resolution, and detailed after-action reporting.
- Collaborate with IT, Dev Ops, and other teams to embed security practices into all phases of the Software Development Life Cycle (SDLC).
- Monitor and maintain security tools such as SIEM, IDS/IPS, DLP, and endpoint protection solutions.
- Oversee the design, implementation, and management of security architectures for cloud-based and on-premise infrastructures.
- Perform periodic reviews of firewall configurations, user access controls, and other security mechanisms to optimize protection.
- Maintain the organization's cybersecurity framework and ensure alignment with industry standards and regulations.
- Proactively evaluate and deploy emerging cybersecurity technologies to mitigate evolving threats.
- Act as the primary contact for security incidents and collaborate with external teams for escalated support.
- Provide leadership in implementing threat intelligence strategies, ensuring continuous improvement of the organization's security posture.
- Threat Detection and Response using tools like Microsoft Defender XDR, Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft Defender for Endpoint.
- Vulnerability Management using tools like Nessus, Qualys, and OpenVAS.
- Privilege Access Management (PAM) using tools like Wallix, CyberArk, and BeyondTrust.
- Security Automation and Orchestration using tools like Python, Splunk Phantom, Cortex XSOAR, and Azure Sentinel.
- Dev Sec Ops using tools like SonarQube, GitHub Actions, and AWS CodePipeline.
- Security Hardening and Compliance using tools like CIS Benchmarks, SITG Benchmarks, and Qualys Policy Compliance.
- Cloud Security using tools like AWS Security Hub, Azure Security Center, and Microsoft Defender for Cloud.
- Network Security using tools like Palo Alto Networks, Fortinet, Cisco ASA, Snort, and Suricata.
- Endpoint Security using tools like Microsoft Defender for Endpoint, CrowdStrike Falcon, and SentinelOne.
Apply safely
To stay safe in your job search, information on common scams and to get free expert advice, we recommend that you visit SAFERjobs, a non-profit, joint industry and law enforcement organization working to combat job scams.