Morison Qatar logo
Remediation and Recovery

Morison Qatar

Job Type

Full-time

Work Type

On-Site

Location

Doha, Qatar

Experience

5 - 10 years

Description:

Seeking an experienced Cybersecurity Incident Response Specialist to manage containment, remediation, and

recovery of cyber incidents. Responsibilities include analyzing security architecture, developing cybersecurity

designs, advising on system protection needs, and enhancing security posture. Expertise in Active Directory, cloud

security, and cybersecurity principles required.

Roles and Responsibilities:

● Engage with affected entities of a cyber incident during the containment and remediation phases.

● Drive the incident remediation and recovery phase.

● Identify and prioritize critical business functions in collaboration with organizational stakeholders.

● Define and prioritize essential system capabilities or business functions required for partial or full system

restoration after a catastrophic failure event.

● Define appropriate levels of system availability based on critical system functions and ensure that system

requirements identify appropriate disaster recovery and continuity of operations requirements to include

any appropriate fail-over/alternate site requirements, backup requirements, and material supportability

requirements for system recovery/restoration.

● Review and analyze system(s) and architecture(s) against cybersecurity architecture guidelines and best

practices, and recommend security services, and security mechanisms to increase the security posture.

● Perform security reviews, identify gaps in security architecture, and develop a security risk management

plan.

● Develop cybersecurity designs for systems and networks with multilevel security requirements or

requirements for the processing of multiple classification levels of data primarily applicable to government

organizations.

● Analyze how the implementation of a new system or new interfaces between systems impacts the security

posture of the current environment.

● Provide advice on design concepts or design changes.

● Determine the protection needs (i.e., security controls) for the information system(s) and network(s)

● Develop a plan to get the affected critical business functions online.

● Develop a strategy to increase the long-term security posture.

● Define a cyber compromise recovery plan and process to eradicate the threat actor and regain control of

the environment.

● Develop and document remediation and recovery reports.

● Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans.

● Document the lessons learned from the incident.

Required Skills:

● Applying and incorporating information technologies into proposed solutions.

● Designing countermeasures to identify security risks.

● Designing the integration of hardware and software solutions.

● Determining how a security system should work and how changes in conditions, operations, or the

environment will affect these outcomes.

● Using virtual private network (VPN) devices and encryption.

● Configuring and utilizing software-based computer protection tools (e.g., software firewalls, antivirus

software) and computer protection components (e.g., hardware firewalls, servers, routers, as appropriate).

● Designing multi-level security/cross-domain solutions.

● Using public-key infrastructure (PKI) encryption and digital signature capabilities in applications (e.g.,

s/mime email, SSL traffic).

● Setting up physical or logical sub-networks that separate an internal local area network (LAN) from other

untrusted networks.

Applying cybersecurity and privacy principles to organizational requirements.

● Identifying cybersecurity and privacy issues that stem from connections with internal and external partner

organizations.

● Implementation and recovery of active directory forests including authentication services such as active

directory federation services and active directory certificate services.

● Troubleshooting Active Directory Replication (AD), Group Policy, DFS Replication (DFSR), supporting

complex multi-forest AD topologies, authoring and triaging Group Policies in large, regulated

environments, ability to identify defects or misconfiguration in AD services

● Understanding and Troubleshooting Windows Server Operating System (OS) Roles.

● Administering, Backup/Recovery, and Troubleshooting Virtualization Platforms, Exchange, SQL Servers,

and Windows Servers.

● Microsoft Azure Infrastructure (IaaS) management and deployment: Virtual Machines, Storage, Networking.

● Troubleshooting Hybrid Identity Including Active Directory, Azure AD, and technologies such as Azure AD

Connect, and Azure AD Password Protection.

● Utilizing SIEM and SOAR platforms such as Microsoft Sentinel, Splunk, and QRadar.

● Utilizing Microsoft Security solutions – Endpoint security, cloud security, and identity.

● Security Software Deployment at scale including troubleshooting and support for various identity

platforms and solutions.

● Analyzing security telemetry in relation to alerts and incidents.