Doha· Monitor and report on the performance of network, system and application security solutions to highlight areas of non-compliance and inform the development of improved practices and processes· Manage the allocation of access privileges of users to ensure appropriate security settings are applied in accordance with organization policies and application owner-defined parameters· Assist with security breach investigations to guide the refinement of information security policies and practices· Manage the periodic maintenance of security systems and applications to ensure new threats are identified and managed and the security of the organization's assets are maintained· Design and deploy Implement IT security for LANs, WANs, network segments, Internet, and intranet systems.
Maintain network hardware and software security in place.· Identify user needs.· Determine network and system requirements.
Build process and procedure.· Installing and implementing security programs· Maintain network servers such as secure VPN, Site to site VPN, Advance threat protection and intrusion detection systems,· Well knowledge difference types of attack like DDoS.
Keeping an eye out for needed updates, routers, switches, firewalls, phones, personal digital assistants, smartphones, software deployment, security updates and patches.
In many cases, E-mail Filter and Internet filters· Prepares users by designing and conducting training programs; providing references and support.
Maintain integrity of the network, server deployment, and security.· Establishes network specifications by conferring with users;
analyzing workflow, access, information, and security requirements; designing router administration, including interface configuration and routing protocols.
Assign configuration of authentication and authorization of directory services.· Analyze and isolate issues.· Monitor networks to ensure security and availability to specific users.
Evaluate and modify system's performance.· Perform network address assignment.· Monitoring network traffic and bottleneck· Testing the network and system weakness.
Secures network by developing network access, monitoring, control, and evaluation;· Maintaining documentation.· Establishes network by evaluating network performance issues including availability, utilization, throughput, good output, and latency;
planning and executing the selection, installation, configuration, and testing of equipment; defining network policies and procedures;
establishing connections and firewalls.· Protects organization's value by keeping information confidential.· Accomplishes organization goals by accepting ownership for accomplishing new and different requests;
exploring opportunities to add value to job accomplishments.· Well troubleshooter hardware error and audit trailer· Well know about Antivirus End point and international standard products· I P phones Security· Need to follow best practice guide line all manners· ITIL and MOF framework well knowledge.
Need to handle daily operations· Give priority assign task, pending work· Report need to submit daily, weekly and monthly activity· Need to maintain check list daily base· Need support for purchasing hardware's and software's for preparing RFP technical specification· Need support for evaluation any IT project· configured network devices need to perform security test· Whenever require as per emergency to late stay in office for assign task or pending work need to complete even holiday.
Maintain Document internal procedures.· Antispam, self-serve Quarantine· Web malware protection, URL filtering, Layer 7 Application control.
Job Type : Full-timeExperience : IT Application Security : 5 years (Required)Location : Doha (Required)Work Remotely : Yes