Cloud Security Architect, Mandiant, Cloud and Infrastructure
United Arab Emirates
Minimum qualifications:
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience.
- Candidates will typically have 6 years of experience assessing and developing cybersecurity solutions and programs across multiple security domains.
- Typically 6 years of experience delivering cyber outcomes, identifying mission risks, and devising solutions to combat public sector focused threats.
- Ability to communicate in Arabic and English fluently as this is a customer-facing role that requires interactions in Arabic and English with local stakeholders.
- Ability to travel up to 50% of the time.
Preferred qualifications:
- Experience with enterprise security controls in on-premises and cloud infrastructures, Zero Trust Architecture, Secure Enterprise Platforms Architecture, Identity providers such as, Google Cloud Platform, Active Directory, Salesforce, B2B/B2C identities and collaboration platforms.
- Experience with enterprise networking and network segmentation strategies, Agile program and project management, SCRUM methodology, DevSecOps, GRC practices, NIST Cybersecurity Framework.
- Experience with cloud governance, with the ability to convey governance principles to cloud computing in terms of policies.
- Knowledge of tools used in pen testing, security event analysis, incident response, computer forensics, network and end-point architecture, or other security operational areas.
About the job
As a Security Consultant, you will be responsible for helping clients effectively prepare for, proactively mitigate, and detect and respond to cyber security threats. Security Consultants have an understanding of computer science, operating system functionality and networking, cloud services, corporate network environments and how to apply this knowledge to cyber security threats.
As a Security Consultant, you could work on engagements including assisting clients in navigating technically complex and high-profile incidents, performing forensic analysis, threat hunting, and malware triage. You may also test client networks, applications and devices by emulating the latest techniques to help them defend against threats, and will be the technical advocate for information security requirements and provide an in-depth understanding of the information security domain. You will also articulate and present complex concepts to business stakeholders, executive leadership, and technical contributors and successfully lead complex engagements alongside cross functional teams.
As a Security Architect, you are responsible for developing and overseeing a on-prem and cloud computing strategy for our customers, as well as responding to on-prem and cloud-related breaches
This includes Cloud adoption plans, and Cloud management and monitoring.
You will need to apply your on-prem and cloud security skills, identity and access management, cloud network architecture, security hardening, and logging enforcement skills to assist clients with architecture, containment and remediation work-streams.
You will provide customers with industry best practice and insight regarding cloud application architecture and deployment in cloud environments.
You will possess strong consulting skills, be adept in leading multiple projects under tight deadlines, and possess in-depth experience in security event monitoring, cyber threat intelligence, and/or computer incident response.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats.
Responsibilities
- Identify solution issue trends, collaborate internally to proactively mitigate future risks.
- Develop improved solution delivery methods and contribute to solution innovation initiatives.
- Collaborate with stakeholders to strategically define solutions and address escalations effectively.
- Advise on tech best practices, optimize stakeholder processes, and build strategic relationships.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory Agile Cloud Computer Science Cyber defense DevSecOps Forensics GCP Governance IAM Incident response Malware Monitoring NIST Pentesting Scrum Strategy Threat intelligence Travel Zero Trust
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Cloud Security Architect jobs
- Open Product Security Engineer jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Information Security Specialist jobs
- Open Cybersecurity Analyst jobs
- Open Information Security Officer jobs
- Open Senior Product Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Chief Information Security Officer jobs
- Open Cyber Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Ethical hacker / Pentester H/F jobs
- Open IT Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Manager Pentest H/F jobs
- Open Cybersecurity Consultant jobs
- Open Security Operations Analyst jobs
- Open Security Consultant jobs
- Open IT Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Information System Security Officer jobs
- Open Senior Network Security Engineer jobs
- Open CISM-related jobs
- Open C-related jobs
- Open Risk assessment-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open IAM-related jobs
- Open ISO 27001-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Analytics-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open Threat intelligence-related jobs
- Open Security assessment-related jobs
- Open Security Clearance-related jobs
- Open Malware-related jobs
- Open DoD-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open DevOps-related jobs
- Open Splunk-related jobs
- Open IDS-related jobs
- Open APIs-related jobs
- Open IPS-related jobs
- Open Kubernetes-related jobs