Information Security Engineer
Zamalek, Cairo Governorate, Egypt
Klivvr
Experience a new world of smart spending, sending and tracking. Card and App in the perfect harmony.Who We Are
We are owned and funded by one of Egypt’s most renowned tech-driven financial services investment platform, Orascom Financial Holding (OFH) and Excel. We’re looking to wholly transform how individuals lead their financial lives. A holistic approach that adds convenience, ease and seamless application to each transaction.
#TheNextBigThing
Our motto
we dream big, stay grounded and look to have a roster of inventive thinkers to lead Klivvr to becoming a global fintech giant.
Our Vision
To be the leader of merging smart financial solutions with cutting-edge technology, enabling people to be in control of their finances and their lifestyle through a simple and easy experience.
Our Mission
Our purpose is to help you master what’s yours, in a simple way that allows you to enjoy the experience of having clarity and control over the way you manage your financials.
Our Values
- We put our visionaries first.
- We strive for innovation.
- We write in pencil.
- We leave our titles at the door.
- We don’t follow suit. Or wear one.
- We see tomorrow and build today.
About The Role
We're looking for a Information Security Engineer to be an integral member of our Security Team. In this high-impact role, you will be responsible for maintaining our security tools, improving the security of our financial services and cloud infrastructure, and helping us reach our security compliance goals. This role will also have responsibilities in endpoint security, cloud security, incident response, and vulnerability assessment. This is a hands-on role, and our ideal candidate will maintain high standards, and wants to play an impactful role in the development of our innovative financial services. This is an excellent opportunity for someone eager to learn and grow.
If you think you have what it takes to Join the Movement and help build #TheNextBigThing, hop on and apply now!
Responsibilities
- Communicate effectively orally and in writing regarding complex protocols and procedures often involving sensitive and confidential data.
- Deep understanding of Standard Information Security Baseline Frameworks, Business Continuity, and Disaster Recovery protocols and best practices, Infrastructure monitoring tools, Certificate Management, PRTG, Palo Alto Firewalls, Microsoft Defender for Business, NESSUS etc.
- Exposure to ITIL (Incident/Change Management) – ITIL v3F preferred.
- Maintain security updates along with testing of Colocation sites with Disaster Recovery technologies.
- Develop, Maintain and recommend resolutions to BCDR (Business Continuity and Disaster Recovery) and Information Security Management Systems
- Monitor and report on all security related matters in the organization.
- Analyze and review information security controls including physical and data security protecting the confidentiality, integrity and availability of information systems data.
- Serve as a member of the risk management committee; responsible for delivering results of operational risk assessments and mitigation tracking information to the committee for review.
- Serve as a member of the incident response team (IRT); could be responsible for the investigation, documentation, communication and/or risk mitigation tracking of the incident.
- Develop, coordinate, and maintain third-party relationships with information security vendors and partners.
- Participate in efforts to improve and promote data security awareness. Participate in bi-annual employee security awareness program as requested.
- Learns and monitors the business processes for the areas of primary support responsibility as defined in the IT Responsibilities matrix.
- Responsible for annual Security Baseline Audits and execution of recommendations
- Maintains familiarity with the business processes, servers and systems of the organization’s user base from a security perspective.
- Monitors and reviews IT security and recommends changes as appropriate.
- Performs routine checks of security and other related log files for devices such as firewalls, switches, and workstations within areas of primary responsibility.
- Stays current with security issues, trends, and best practices.
- Execute any other assigned tasks.
- Years of experience 0 to 2 Max
Requirements
- Years of experience 0 to 2 Max
- Experience in building and maintaining security systems
- Detailed technical knowledge of database and operating system security
- Hands on experience in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc
- Experience with network security and networking technologies and with system, security, and network monitoring tools
- Thorough understanding of the latest security principles, techniques, and protocols
- Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocols
- Problem solving skills and ability to work under pressure.
- BS degree in Computer Science or related field
Benefits
Perks of being a Klivvr Innovator
- Competitive salaries and monthly allowances
- We celebrate hard work! In Klivvr we offer bonuses up to 4 months for top achievers.
- We want you to stay healthy and safe, we offer private Health Insurance coverage for our employees.
- We believe in work-life balance, so we offer you the 21 days of annual leaves as per labor law.
- You get to work two [2] days from home based on your schedule.
Diversity Commitment
In Klivvr we are focused on building a diverse and inclusive team. We welcome people of all backgrounds, experiences, abilities, and perspectives and are an equal opportunity employer. We not only capitalize on people’s differences, we celebrate them!
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Audits Business Intelligence Certificate management Cloud Compliance Computer Science Endpoint security FinTech Firewalls Incident response Intrusion detection ITIL Log files Monitoring Nessus Network security Risk assessment Risk management
Perks/benefits: Career development Competitive pay Health care
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Product Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Specialist jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Cybersecurity Specialist jobs
- Open Senior Security Architect jobs
- Open IT Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open Forensics-related jobs
- Open Kubernetes-related jobs