{"id":261,"date":"2014-05-21T07:42:39","date_gmt":"2014-05-21T07:42:39","guid":{"rendered":"http:\/\/www.2softsolutions.com\/blogs\/?p=261"},"modified":"2025-07-28T13:51:14","modified_gmt":"2025-07-28T08:21:14","slug":"information-security-lead-consultant-for-dubai","status":"publish","type":"post","link":"https:\/\/www.2softsolutions.com\/blogs\/information-security-lead-consultant-for-dubai\/","title":{"rendered":"Information Security\u2013Lead Consultant for Dubai"},"content":{"rendered":"<p>We are hiring for our UAE based client for below mention position. If you interested, please review the JD and share your updated resume.<\/p>\n<p>Position: Information Security \u2013 Lead Consultant<br \/>\nJob Location: Dubai, UAE<br \/>\nSalary: As per market<\/p>\n<p><strong>Requirements<\/strong><br \/>\nTo qualify, candidates must have:<br \/>\n\u2022\u00a0\u00a0 \u00a0A bachelor&#8217;s degree and approximately 8 years of related work experience; or a graduate degree and approximately 4-6 years of related work experience in Consulting in a Big 4 or Tier 1 or 2 Consulting firm.<br \/>\n\u2022\u00a0\u00a0 \u00a0A degree in business, computer science, information systems, engineering, or a related discipline<br \/>\n\u2022\u00a0\u00a0 \u00a0Extensive experience working as an Information Security Consultant,\u00a0 IT Security Management or IT adviser for a professional services firm, or within industry. Professional Services and consulting experience is a must.<br \/>\n\u2022\u00a0\u00a0 \u00a0Significant experience in having applied relevant technical knowledge in the following engagements:<br \/>\n\u2022\u00a0\u00a0 \u00a0Hands on Experience in:<br \/>\no\u00a0\u00a0 \u00a0Risk&amp; Compliance: ISO 27001, ISO 27005, RIsk IT, BS25999<br \/>\no\u00a0\u00a0 \u00a0Governance: COBIT , ISO 38500, ValIT<br \/>\no\u00a0\u00a0 \u00a0Architecture: TOGAF<br \/>\no\u00a0\u00a0 \u00a0Project Management: PMP or Prince2<br \/>\no\u00a0\u00a0 \u00a0Enterprise IS Security Strategy<br \/>\no\u00a0\u00a0 \u00a0Information security policies, procedure and framework<br \/>\no\u00a0\u00a0 \u00a0Analyse and mitigate increasingly complex threats<br \/>\no\u00a0\u00a0 \u00a0Measure, track and report on security metrics<br \/>\no\u00a0\u00a0 \u00a0Assist in fully outsourced or outsourced solutions<br \/>\no\u00a0\u00a0 \u00a0SOC Consulting &amp; Implementation<br \/>\no\u00a0\u00a0 \u00a0Security &amp; Event Monitoring Tool Automation<br \/>\no\u00a0\u00a0 \u00a0PCIDSS Consulting Services<br \/>\no\u00a0\u00a0 \u00a0ISO 27001 Consulting services<br \/>\no\u00a0\u00a0 \u00a0DLP \/ DRM Solution Conceptualization and Implementation<br \/>\no\u00a0\u00a0 \u00a0Security and Event Monitoring Process Design<\/p>\n<p>\u2022\u00a0\u00a0 \u00a0Working &amp; Domain Knowledge of:<br \/>\no\u00a0\u00a0 \u00a0Attack and Penetration Testing<br \/>\no\u00a0\u00a0 \u00a0Application security review<br \/>\no\u00a0\u00a0 \u00a0Security configuration Review<br \/>\no\u00a0\u00a0 \u00a0Network Security Architecture Review<\/p>\n<p>\u2022\u00a0\u00a0 \u00a0Minimum 10 ISO 27001 in medium to large organizations<br \/>\n\u2022\u00a0\u00a0 \u00a0Experience of Banking, Telecom, Oil &amp; Gas and Government sector preferred<br \/>\n\u2022\u00a0\u00a0 \u00a0Project Management experience as project and technical lead of 3 years including client management and team management<br \/>\n\u2022\u00a0\u00a0 \u00a0Advanced written and verbal communication skills and presentation skills<br \/>\n\u2022\u00a0\u00a0 \u00a0Excellent leadership, teamwork and client service skills<br \/>\n\u2022\u00a0\u00a0 \u00a0Demonstrated integrity within a professional environment<\/p>\n<p>Ravi<br \/>\n9920698532<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are hiring for our UAE based client for below mention position. If you interested, please review the JD and share your updated resume. Position:<\/p>\n","protected":false},"author":1,"featured_media":263,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,5],"tags":[154,100,101,151,152,97,98,102,105,106,99,153,104,103],"class_list":["post-261","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-permanent-jobs","category-permanent-staffing-services","tag-information-security","tag-bs25999","tag-cobit","tag-dlp","tag-drm","tag-iso-27001","tag-iso-27005","tag-iso-38500","tag-pmp","tag-prince2","tag-risk-it","tag-soc-consulting","tag-togaf","tag-valit"],"_links":{"self":[{"href":"https:\/\/www.2softsolutions.com\/blogs\/wp-json\/wp\/v2\/posts\/261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.2softsolutions.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.2softsolutions.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.2softsolutions.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.2softsolutions.com\/blogs\/wp-json\/wp\/v2\/comments?post=261"}],"version-history":[{"count":1,"href":"https:\/\/www.2softsolutions.com\/blogs\/wp-json\/wp\/v2\/posts\/261\/revisions"}],"predecessor-version":[{"id":264,"href":"https:\/\/www.2softsolutions.com\/blogs\/wp-json\/wp\/v2\/posts\/261\/revisions\/264"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.2softsolutions.com\/blogs\/wp-json\/wp\/v2\/media\/263"}],"wp:attachment":[{"href":"https:\/\/www.2softsolutions.com\/blogs\/wp-json\/wp\/v2\/media?parent=261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.2softsolutions.com\/blogs\/wp-json\/wp\/v2\/categories?post=261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.2softsolutions.com\/blogs\/wp-json\/wp\/v2\/tags?post=261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}