Azentio Software Private Limited

Azentio Software Private Limited


Information Technology



Company Size






Senior Information Security Engineer (Cairo / Beirut / Koch i/ Karachi)

Job type: Full-Time

Salary: Undisclosed

Job Industry: Information Technology

Area: Beirut

Expiry date: 17/10

Duties & Responsibilities:

  • Monitoring, evaluating, and maintaining systems and procedures to safeguard internal information systems, networks, databases, and web-based security

  • Conducting vulnerability assessments and monitoring systems, networks, databases and web for potential system breaches

  • Responding to alerts from information security tools

  • Reporting, investigating, and resolving security incidents

  • Recommending and implementing changes to enhance systems security and preventing unauthorized access

  • Researching security trends, new methods and techniques used in unauthorized access of data in order to preemptively eliminate the possibility of system breach

  • Overseeing internal and external systems security (i.e. cloud services)

  • Ensuring that clients and users have the right access to the right systems at the right times.

Required Skills & Qualifications:

  • Bachelor’s degree in a relevant major such as Computer Science or Information Systems

  • 5+ years of experience in security engineering, design and implementation

  • Thorough understanding of network defense technologies, TCP/IP networking, Active Directory, DHCP, DNS, network security monitoring tools, secure engineering principles and technical security testing

  • Experience with a scripting language in an incident response environment

  • Working knowledge of Firewall Configuration, Intrusion Detection, Firewall Monitoring, System Monitoring

  • Strong knowledge of Encryption /Tokenization /Key Management

  • Working experience and ability to conduct network vulnerability testing and remediation

  • Experience in designing secure networks, systems and application architectures

  • Knowledge of disaster recovery, computer forensic tools, technologies and methods

  • Experience in planning, researching and developing security policies, standards and procedures

  • Ability to read and use the results of mobile code, malicious code, and anti-virus software.

This Position Has Expired