Accessibility Links
  • Job reference: RMS0152195

I.T. Security Architect (Disaster Recovery)

  • Sector: ICT
  • Location: Saudi Arabia
  • Job type: Permanent
  • Date posted: 27/04/2015
  • Time left:
    d h m s
This vacancy has now expired.
Send jobs like this to my email    What's this?
The Company:
Sadara Chemical Company is an exciting joint venture between Saudi Aramco, one of the leading energy suppliers to the world, and The Dow Chemical Company a leading science and Technology Company of the world. Sardara will represent the largest petrochemical facility ever built in a single phase establishing a world-scale manufacturing footprint that delivers a full range of value-added performance products encompassing 26 manufacturing plants. The integrated complex based in Al Jubayl, Kingdom o

The Role:
The Information Security Principal Architect in Disaster Recovery will be a senior member of the Business Continuity and Disaster Recovery section of the IT Security department.

1. Develop project and service rationale and perform scoping assessments to determine feasibility; provide guidance and advice regarding vendor selection and implementation process.
2. Functional areas include:
 UserID administration
 Password administration
 Group Administration
 Group Policy Object (GPO) Administration
 Active Directory Data Integrity
 Access permissions to environment
 Role-based access administration
3. Highlight/identify gaps in existing functionality and review requirements with stakeholders.
4. Develop comprehensive requirement specifications that will determine the estimate of cost, time and resources to deploy solutions.
5. Research and recommend high level functional and/or technical solutions.
6. Develop project estimates & complete financial model (costs, savings, revenue opportunities, investment horizon, etc.)
7. Ensure that relevant stakeholders are involved in specification of new services and/or major upgrades to existing services.
8. Modify existing applications or direct programmers and analysts to make changes; test programs or applications, correct errors and make necessary modifications.
9. Handle complex projects and assignments, such as recurring application, service, or operational problems, and use expertise to recommend solutions to management.
10. Oversee the implementation of new systems/services.
11. Train and direct IT staff by sharing expertise and experience and developing the knowledge of the IT staff.
12. Keep abreast of trends and developments throughout the computer industry to recommend new IT solutions that would improve the performance of certain functions or the company as a whole.
13. Perform any job-related activities as requested by the immediate supervisor/manager.

Specific areas, technologies and products:
• Facilitating definition of the Company’s risk profile
• Maintaining the cyber security product and system architectures, ensuring that the company’s risk profile is adequately addressed, keeping gaps or overlaps in functionality and protection to a minimum to balance risk with cost
• Maintaining relationship with industry groups, peer companies, and participating in cyber security forums
• Conducting Business Impact Assessments, formulating Disaster Recovery and Business Continuity Plans
• Establishing intrusion protection / detection plans and mechanisms: Perimeter security, web protection, DDoS detection and response
• Security risk assessment, vulnerability testing, penetration testing
• Identity and access management, security administration
• Firewall administration
• Experience with use and management of SIEM systems
• Driving security awareness programs
In addition, this team perform administration of access and rules for several other environments, such as:

• Wireless guest access
• Web Gateway whitelisting

This specific role is in charge of day-today supervision of two teams:

1. Active Directory team, and general non-SAP systems
2. SAP GRC Access Management team
Each team above consists of 3-5 analysts. In addition, this role maintains close relationship with the Information Security team, who owns the end-to-end IAM process. This role is operational in nature.

1. Manage and oversee the day-to-day work performed by staff as assigned
2. Ensure all tasks and activities are performed in accordance with Company’s policies and procedures.
3. Motivate, coach, develop and support employees (3 to 5 analysts)

Essential Skills / Qualifications:
• Bachelor degree in Computer Science, Management Information Systems (MIS), Engineering or any related field.
Professional Experience (minimum)
• Deep knowledge and experience in one or more areas of IT security: Disaster Recovery / Business Continuity; Security Operations / Security Operations Center; Identity Provisioning; SAP or Application Security
• Experience of analyzing and breaking down problems and information using structured frameworks and methodologies
• Analytical thinking abilities and client facing communication skills
• Deep technical, SAP, Manufacturing or Chemical industry knowledge
• 6+ years of experience in analysis and problem solving
• Small team leadership
Similar jobs
Ahmed Jamal Khan
AX Business Analyst Location Home Based Duration permanent The Role: Main Internal Relationships: A close working...
Automated Software Engineer Location Derby, Derbyshire Duration permanent The Role: What we are looking for Someone who is passionate...
James Smith
ICT Support Field Specialist Location North East England Duration 12 months The Role: In line with business and legislative requirements...

Back to Top

By clicking "Save" you consent to
receiving matching jobs based on the
job/page you are viewing by email from
Fircroft, as detailed in our privacy policy