{"id":13291,"date":"2025-05-04T16:20:55","date_gmt":"2025-05-04T13:20:55","guid":{"rendered":"https:\/\/hajarexcel.com\/security-engineer\/"},"modified":"2025-06-15T10:51:41","modified_gmt":"2025-06-15T07:51:41","slug":"security-engineer","status":"publish","type":"post","link":"https:\/\/hajarexcel.com\/ar\/security-engineer\/","title":{"rendered":"Security Engineer"},"content":{"rendered":"<h4 dir=\"ltr\"><span style=\"color: #0070c0;\"><strong><u>About Our Client<\/u><\/strong><\/span><\/h4>\n<p dir=\"ltr\"><span style=\"color: #000000;\">One of our clients, \u201cA company in Yemen&#8221;, is seeking to recruit a highly qualified employees where that company always relies on the recruitment of those with excellent educational qualifications and reputable people, and also to provide exceptional job opportunities.<\/span><\/p>\n<h4 dir=\"ltr\"><span style=\"color: #0070c0;\"><strong><u>Security Engineer<\/u><\/strong><\/span><\/h4>\n<p dir=\"ltr\"><span style=\"color: #92d050;\"><strong>Department: <\/strong><\/span><span style=\"color: #000000;\"><strong>Information Security and Compliance<\/strong><\/span><\/p>\n<p dir=\"ltr\"><span style=\"color: #92d050;\"><strong>Travel Requirement:<\/strong><\/span> <span style=\"color: #000000;\"><strong>No<\/strong><\/span><\/p>\n<p dir=\"ltr\"><span style=\"color: #92d050;\"><strong>Place: <\/strong><\/span><span style=\"color: #000000;\"><strong><u>Sana\u2019a Governorate<\/u><\/strong><\/span><\/p>\n<p dir=\"ltr\"><span style=\"color: #92d050;\"><strong>End Date: <\/strong><\/span><span style=\"color: #ff0000;\"><strong><u>14 June 2025<\/u><\/strong><\/span><\/p>\n<h4 dir=\"ltr\"><span style=\"color: #00b0f0;\"><strong>Summary<\/strong><\/span><\/h4>\n<p dir=\"ltr\"><span style=\"color: #000000;\">The Security Engineer is responsible for designing, implementing, and maintaining security measures to protect the organization infrastructure, computer systems, networks, and data from cyber threats. This role involves assessing security risks, developing security solutions, and responding to security incidents to safeguard the organization&#8217;s information assets and maintain compliance with regulatory requirements and industry standards.<\/span><\/p>\n<h4 dir=\"ltr\"><span style=\"color: #00b0f0;\"><strong>Key Duties and Responsibilities<\/strong><\/span><\/h4>\n<ul dir=\"ltr\">\n<li><span style=\"color: #000000;\">Conduct security assessments to identify vulnerabilities and assess the security posture of the organization&#8217;s systems and networks.<\/span><\/li>\n<li><span style=\"color: #000000;\">Design and implement security controls and measures to protect against cyber threats, including firewalls, intrusion detection\/prevention systems (IDS\/IPS), endpoint protection, network analysis, identity analysis, data protection and encryption.<\/span><\/li>\n<li><span style=\"color: #000000;\">Monitor security logs and alerts, investigate security incidents, and respond to security breaches in a timely and effective manner.<\/span><\/li>\n<li><span style=\"color: #000000;\">Monitor security event logs and alerts from various sources, including intrusion detection\/prevention systems, firewalls, endpoint security solutions, and security information and event management (SIEM &amp; SOAR), EDR, Identity management, and information security systems.<\/span><\/li>\n<li><span style=\"color: #000000;\">Develop and maintain security policies, procedures, and standards to ensure compliance with regulatory requirements such as (GDPR, HIPAA) and industry standards such as (ISO 27001, NIST Cybersecurity Framework).<\/span><\/li>\n<li><span style=\"color: #000000;\">Collaborate with cross-functional teams, including IT, development, and operations, to integrate security best practices into the organization&#8217;s systems and processes.<\/span><\/li>\n<li><span style=\"color: #000000;\">Conduct security awareness training and provide guidance to employees on security best practices and procedures.<\/span><\/li>\n<li><span style=\"color: #000000;\">Stay abreast of emerging threats, vulnerabilities, and security technologies through continuous learning and professional development activities.<\/span><\/li>\n<li><span style=\"color: #000000;\">Participate in incident response planning and exercises to test and improve the organization&#8217;s incident response capabilities.<\/span><\/li>\n<li><span style=\"color: #000000;\">Evaluate and recommend security products and solutions to enhance the organization&#8217;s security posture.<\/span><\/li>\n<li><span style=\"color: #000000;\">Mitigate and resolve vulnerabilities found in systems and implement a solution for risks and threats.<\/span><\/li>\n<li><span style=\"color: #000000;\">Prepare reports and presentations on security incidents, vulnerabilities, and risk assessments for management, stakeholders, and regulatory authorities.<\/span><\/li>\n<\/ul>\n<h4 dir=\"ltr\"><span style=\"color: #00b0f0;\"><strong>Required Skills<\/strong><\/span><\/h4>\n<ul dir=\"ltr\">\n<li><span style=\"color: #000000;\">Proficiency in cybersecurity principles, concepts, and best practices.<\/span><\/li>\n<li><span style=\"color: #000000;\">Familiarity with security tools and technologies, such as firewalls, IDS\/IPS, SIEM &amp; SOAR, Endpoint Protection, EDR, XDR methodology, encryption, and vulnerability assessment tools.<\/span><\/li>\n<li><span style=\"color: #000000;\">Skill in incident detection, investigation, and response procedures, including forensics and malware analysis.<\/span><\/li>\n<li><span style=\"color: #000000;\">Ability to assess and prioritize security risks, develop risk mitigation strategies, and implement security controls.<\/span><\/li>\n<li><span style=\"color: #000000;\">Knowledge of regulatory requirements and compliance frameworks applicable to cybersecurity, such as GDPR, HIPAA, PCI DSS, ISO 27001, and NIST Cybersecurity Framework.<\/span><\/li>\n<li><span style=\"color: #000000;\">Network Security: Understanding of network security principles and protocols, including TCP\/IP, DNS, DHCP, and VPN.<\/span><\/li>\n<li><span style=\"color: #000000;\">Excellent communication and interpersonal skills to communicate effectively with stakeholders and convey complex technical concepts to non-technical audiences.<\/span><\/li>\n<li><span style=\"color: #000000;\">Strong analytical and problem-solving skills to analyze security incidents, identify root causes, and develop effective solutions.<\/span><\/li>\n<li><span style=\"color: #000000;\">Ability to collaborate with cross-functional teams and work effectively in a team environment.<\/span><\/li>\n<li><span style=\"color: #000000;\">Willingness to stay updated on emerging threats, vulnerabilities, and security technologies through continuous learning and professional development activities.<\/span><\/li>\n<\/ul>\n<h4 dir=\"ltr\"><span style=\"color: #00b0f0;\"><strong>Education and Experience<\/strong><\/span><\/h4>\n<ul dir=\"ltr\">\n<li><span style=\"color: #000000;\">Bachelor&#8217;s Degree in Computer Science, Information Technology, Cybersecurity, or a related field.<\/span><\/li>\n<li><span style=\"color: #000000;\">Relevant certifications such as (CISSP, CEH, CompTIA Security+, Certified Information Security Manager (CISM), or other industry-recognized certifications).<\/span><\/li>\n<li><span style=\"color: #000000;\">Minimum 3 years of experience in cybersecurity roles, including experience in security assessments, incident response, security architecture, and security operations.<\/span><\/li>\n<\/ul>\n<h4 dir=\"ltr\"><span style=\"color: #0070c0;\"><strong><u>Submission mechanism<\/u><\/strong><\/span><\/h4>\n<p dir=\"ltr\"><span style=\"color: #000000;\">Those who meet the above requirements must submit their information under <a style=\"color: #000000;\" href=\"https:\/\/hajarexcel.com\/ar\/category\/jobs-ar\/\"><strong>Hajar Excel Website<\/strong><\/a> or our<strong> Recruitment Platform HERP: <\/strong><a style=\"color: #000000;\" href=\"https:\/\/herp.hajarexcel.com\/jobs\/64\"><strong>Click HERE.<\/strong><\/a><\/span><\/p>\n<h4 dir=\"ltr\"><span style=\"color: #ff0000;\"><strong><u>Ensure to:<\/u><\/strong><\/span><\/h4>\n<ul dir=\"ltr\">\n<li><span style=\"color: #000000;\">Add\/update your data correctly in the platform<\/span><\/li>\n<li><span style=\"color: #000000;\">Upload your ID Card (Required)<span style=\"color: #ff0000;\">*<\/span>.<\/span><\/li>\n<li><span style=\"color: #000000;\">Upload your college transcript and certificates (Required)<span style=\"color: #ff0000;\">*<\/span>.<\/span><\/li>\n<li><span style=\"color: #000000;\">All Applications should be in English, other will not be considered<span style=\"color: #ff0000;\">*<\/span>.<\/span><\/li>\n<li><span style=\"color: #000000;\">Candidates who have not applied through <strong>HERP<\/strong> will not be considered.<\/span><\/li>\n<\/ul>\n<p dir=\"ltr\"><span style=\"color: #000000;\"><strong>Only shortlisted candidates will be contacted after the application submitting deadline.<\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>About Our Client One of our clients, \u201cA company in Yemen&#8221;, is seeking to recruit a highly qualified employees where that company always relies on the recruitment of those with excellent educational qualifications and reputable people, and also to provide exceptional job opportunities. Security Engineer Department: Information Security and Compliance Travel Requirement: No Place: Sana\u2019a [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":11970,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[66],"tags":[],"class_list":["post-13291","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-jobs-sohobcom-ar"],"_links":{"self":[{"href":"https:\/\/hajarexcel.com\/ar\/wp-json\/wp\/v2\/posts\/13291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hajarexcel.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hajarexcel.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hajarexcel.com\/ar\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/hajarexcel.com\/ar\/wp-json\/wp\/v2\/comments?post=13291"}],"version-history":[{"count":4,"href":"https:\/\/hajarexcel.com\/ar\/wp-json\/wp\/v2\/posts\/13291\/revisions"}],"predecessor-version":[{"id":13353,"href":"https:\/\/hajarexcel.com\/ar\/wp-json\/wp\/v2\/posts\/13291\/revisions\/13353"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hajarexcel.com\/ar\/wp-json\/wp\/v2\/media\/11970"}],"wp:attachment":[{"href":"https:\/\/hajarexcel.com\/ar\/wp-json\/wp\/v2\/media?parent=13291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hajarexcel.com\/ar\/wp-json\/wp\/v2\/categories?post=13291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hajarexcel.com\/ar\/wp-json\/wp\/v2\/tags?post=13291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}