Jobs in Audit & Accountancy companies, Qatar

Job Description:The SOP Writer will be responsible for developing, reviewing, and maintaining Standard Operating Procedures(SOPs) across the bank’s functions. This role is central to ensuring standardized, efficient, and compliant operationsthat support the bank’s service delivery and operational excellence goals. The incumbent will work closely withprocess stakeholders, department heads, and compliance units to produce clear, structured, and user-centric SOPsthat reflect best practices and regulatory requirements.Key Responsibilities:● Collaborate with process owners, subject matter experts (SMEs), and the Operational Excellence team tounderstand business processes and document them into SOPs.● Develop new SOPs based on redesigned or newly introduced operational and service delivery processes.● Standardize SOP structure, formatting, and terminology in line with the bank’s documentation and qualityguidelines.● Translate complex workflows, regulatory obligations, and system steps into clear, actionable SOPs tailored tothe end-users.● Ensure that all SOPs align with the bank’s operational risk management, compliance, and internal controlframeworks.● Review and update existing SOPs in response to process changes, audit findings, or service improvementinitiatives.● Support service excellence initiatives by ensuring SOPs enable efficiency, consistency, and customer-centricservice delivery.● Maintain a version-controlled SOP repository and coordinate periodic SOP reviews with relevant stakeholders.● Track progress of SOP development and provide regular reports to the Operational & Service Excellence leadership.● Participate in process mapping workshops and document supporting artifacts (e.g., RACI matrices, processflows).● Liaise with internal audit, risk, compliance, and training teams to ensure SOPs are accurate and actionable.Reporting Line:This position reports to the Senior Manager – Operational & Service Excellence. Key Skills & Competencies:● Excellent writing, structuring, and editing skills tailored for professional SOP documentation.● Strong understanding of operational workflows and service delivery models.● Familiarity with regulatory, compliance, and quality standards relevant to banking and financial institutions.● Proficient in MS Office (especially Word and Visio) and document management platforms.● Working knowledge of business process mapping tools is a plus.● Strong interpersonal and stakeholder management skills.● Highly organized with attention to detail and adherence to timelines.Qualifications & Experience:● Bachelor’s or Master’s degree in a related field.● 5–8 years of relevant experience in SOP writing, technical documentation, or operations support.● Prior experience in the banking, financial services, or regulated industries is highly preferred.● Exposure to Operational Excellence, Business Process Reengineering (BPR), or Continuous Improvement initiatives is desirable.

Posted a month ago

e have a below mention openingJob Title: Data Analyst Experience: Minimum 7 Years Location: QatarJob Description: We are looking for a skilled Data Analyst with at least 7 years of experience to collect, process, and perform statistical analyses on large datasets. The ideal candidate should be able to turn data into meaningful insights to support strategic decision-making.Key Responsibilities:Analyze complex data sets and generate actionable insightsDevelop and maintain dashboards and reportsIdentify trends, patterns, and anomalies in dataCollaborate with business units to define data requirementsPresent findings to stakeholders in clear, concise reportsKey Skills:Strong analytical and problem-solving skillsProficiency in tools such as Excel, SQL, Power BI, Python, or RExcellent communication and reporting abilitiesTransform raw data into actionable insights by utilizing statistical methods and data visualization techniques to support business decision-making.Collaborate with cross-functional teams to understand data requirements and provide timely and accurate reports that meet business needs.Conduct thorough data cleansing and validation processes to ensure data integrity and reliability before analysis.Leverage advanced analytical tools and software, such as SQL and Python, to conduct exploratory data analysis and identify trends.Prepare and present findings in a clear and compelling manner, using storytelling techniques to convey complex data insights to stakeholders.Monitor key performance indicators (KPIs) and develop dashboards to track business performance effectively.Participate in the design and implementation of data collection systems, ensuring they capture relevant metrics for future analysis.Stay up-to-date with industry trends, emerging technologies, and best practices in data analytics to continuously improve processes.Assist in the creation of predictive models that forecast potential trends based on historical data, enhancing decision-making capabilities.Provide training and support to team members on data tools and analytics techniques, fostering a data-driven culture within the organization.

Posted 2 months ago

Job Description:We are seeking an experienced and highly skilled IT Business System Analyst to bridge the gap between business needs and technology solutions. In this role, you will analyze business processes, gather requirements, and collaborate with technical teams to implement and optimize IT systems, ensuring alignment with organizational goals.As part of the IT team, the incumbent will work closely with all the departments of the Organisation. The role is based in Hamad Port in Doha, Qatar, and reports to the Head of Business Solutions.Key Responsibilities:● Business Analysis & Requirements Gathering:○ Work closely with stakeholders to understand business needs and translate them into functional IT requirements.○ Document business processes, work flows, system interactions and integrations.○ Conduct gap analysis and recommend process improvements.○ Facilitate workshops, work closely with business stakeholders, IT teams, and vendors to design and implement business solutions.● System Implementation & Support:○ Assist in the design, development, and deployment of IT systems, ensuring alignment with business requirements.○ Work with vendors and Managed Service Providers (MSPs) to resolve technical and functional issues.○ Assist in change management and user training to ensure smooth adoption of new solutions.● Testing & Quality Assurance:○ Develop test cases, conduct system testing, and support user acceptance testing (UAT).○ Ensure system changes and upgrades do not disrupt business operations.● Project Management & Documentation:○ Assist in IT project planning, tracking progress, and ensuring timely delivery.○ Understanding of Agile, Scrum, and Waterfall methodologies○ Create and maintain technical documentation, user guides, and training materials.○ Apply PMI methodologies and best practices to manage project scope, timelines, and deliverables.

Posted 3 months ago

Vimal Fire Controls Pvt. Ltd. is an ISO 9001:2015, 14001:2015, 45001:2018 certified company, engaged in the manufacturing of sophisticated products ranging from Specialized Fire Extinguishers to Advanced Fire Fighting Systems under our portfolio of Fire Safety, Security & Surveillance.A leading enterprise in the fire safety industry, renowned for its expertise in the Oil & Gas sector across Indian markets various countries specially to Gulf countries (UAE, Kuwait, Saudi etc.), African and European countries.Vimal’s SHOOTFIRE brand is one of the most renowned and reliable brand-names of India in the field of Fire Safety. We have our Corporate Office in Mumbai, & state-of-the-art manufacturing plant in Vadodara, Gujarat. Our customers include; Oil & Gas, Power, Renewable Energy, Chemicals, Petrochemicals, Fertilizers, Railways, Defence, Coal Mines, Aviation, Automotive Industry, Ports, Multi-National Companies (MNC’s), Municipal Corporations, Infrastructure Developers, EPC Contractors etc.Department: - Sales & MarketingPosition Name: - Sales Manager – Exports (Qatar)Location: - QatarReporting To: - GM - ExportsKey Responsibilities and Deliverables:§ Drive Export business growth for the safety equipment and projects across the Qatar, Kuwait and Oman regions in the Oil & Gas and Power sectors.§ Ensure achievement of sales targets and business objectives in the assigned territories.§ Expand market share for specialised fire safety kits in B2C/B2B/B2G segments.§ Provide market intelligence and competitor analysis to enhance business growth strategies.§ Built and maintain strong relationships with key stakeholders.

Posted 4 months ago

The Candidate must have a EXIM Bank experience of 2-4 years.Position Overview:We are seeking a skilled and experienced Mid-Level Credit Risk and Portfolio Analyst with 5-12 years of relevantexperience, specifically within EXIM banks or similar organizations to join our team. This role involves managingcredit risk-related projects for a development bank and overseeing portfolio management functions. The idealcandidate will have a strong background in project planning, risk management, and reporting.Key Responsibilities:Project Management:● Design and implement comprehensive credit risk mitigation plans for each project.● Lead and coordinate project planning sessions, ensuring all stakeholders are engaged and satisfied.● Define the scope and objectives of projects, ensuring alignment with organizational goals.● Prepare detailed project budgets and manage resources effectively to ensure projects are completed ontime and within budget.● Monitor and evaluate project performance, making necessary adjustments to ensure successful completion.● Maintain clear and consistent communication with stakeholders, providing regular updates on projectprogress and any issues that arise.Credit Risk Management:● Define the credit risk appetite for the portfolio and implement strategies and measures to manage creditrisk effectively.● Conduct thorough credit risk assessments for new and existing clients, including financial analysis and riskrating.● Develop and maintain credit risk models to predict potential credit losses and inform decision-making.● Prepare monthly reports on portfolio credit risk performance, including an overview of new businessactivities and credit risk exposure.● Produce monthly reports on credit risk concentration, detailing country, sector, risk rating, and single riskexposures, along with board-imposed limits.● Compile and present a comprehensive Credit Risk Report every six months, covering financial andnon-financial risks within the portfolio.● Report on Expected and Unexpected Credit Losses every six months.● Provide quarterly updates on Key Performance Indicators (KPIs) related to credit risk management.Portfolio Management:● Define the risk appetite for the portfolio and implement strategies and measures to manage risk effectively.● Prepare monthly reports on portfolio performance, including an overview of new business activities.● Produce monthly reports on liquidity and concentration risk, detailing country, sector, risk rating, and singlerisk exposures, along with board-imposed limits.● Compile and present a comprehensive Risk Report every six months, covering financial and non-financialrisks within the portfolio.● Report on Expected and Unexpected Losses every six months.● Provide quarterly updates on Key Performance Indicators (KPIs) related to the portfolio.

Posted 7 months ago

Job Summary: We are seeking a diligent and experienced Assistant Manager Tax to join our team in Doha, Qatar. The ideal candidate will have a strong background in tax compliance, project management, and client relationship management, with a focus on local and international tax laws. This role involves overseeing the tax return preparation process, managing tax representation cases, and contributing to the development of tax compliance strategies, ensuring adherence to Qatar’s tax regulations. Prior experience with Qatar tax laws and regulations is essential. Key Responsibilities: 1. Project Management of Tax Return Preparations: Oversee the entire tax return preparation process, ensuring timely and accurate filing in compliance with Qatar’s tax laws and deadlines. Coordinate with various departments and team members to gather necessary information and documentation for tax filings. Monitor the progress of tax return projects, ensuring that all deliverables are met within the specified timelines. 2.Review of Tax Returns:Conduct detailed reviews of tax returns to ensure they comply with Qatar tax regulations and identify any potential issues or discrepancies. Provide feedback and guidance to junior staff on improving the accuracy and completeness of tax filings. Collaborate with clients to clarify any discrepancies and resolve issues related to their tax returns. 3.Project Management of Tax Representation Cases: Manage tax representation cases on behalf of clients, including liaising with Qatar tax authorities and other relevant stakeholders. Develop and execute strategies for effective handling of tax assessments, audits, and disputes. Prepare and submit appeals and other necessary documentation to the relevant authorities, ensuring the best outcomes for clients. 4.Drafting and Reviewing Tax Advisories: Draft and review tax advisories, providing expert advice on a range of tax matters, including corporate tax. Stay informed about changes in Qatar’s tax legislation and global tax practices, ensuring that clients receive up-to-date and relevant advice. Collaborate with senior management to develop and implement tax planning strategies for clients. 5.Account Management of Assigned Clients:Serve as the primary point of contact for a portfolio of clients, managing and nurturing these relationships. Understand the unique needs of each client and provide tailored tax advice and solutions to meet their business objectives. Regularly meet with clients to review their tax position, address any concerns, and update them on relevant tax developments. Qualifications & Experience: Educational Requirements: Bachelor’s degree in accounting, Finance, or a related field. Professional Certifications: Professional qualifications such as CPA, ACCA, or CA are preferred. Work Experience:A minimum of 4-6 years of experience in tax compliance, with at least 3 years of experience specifically in Qatar tax laws and regulations. Big 4 Experience is preferred Competencies Required:Strong knowledge of Qatar tax laws and international tax regulations. Excellent project management skills with the ability to handle multiple tasks and meet tight deadlines. Strong analytical and problem-solving skills with attention to detail. Excellent communication skills, both verbal and written. Proficiency in tax software and Microsoft Office Suite. Other requirements: Available to join on or before 1st December 2024. Should be available in Qatar. Preferred Skills: Proven experience in handling tax audits and disputes in Qatar. Familiarity with Qatar Financial Centre (QFC) regulations. Preferred Bilingual in English & Arabic. Ability to work effectively in a team environment and lead junior staff.

Posted 9 months ago

Scope and Summary:The Cyber Security Strategy Senior Specialist is responsible for developing, implementing, and continuously enhancing the organization’s cyber security strategy. This role involves aligning cyber security initiatives with business objectives, ensuring comprehensive protection against cyber threats, and fostering a culture of security awareness. The Senior Specialist will act as a key advisor to the executive leadership team, providing expert guidance on emerging threats, regulatory requirements, and industry best practices.Key Responsibilities:Cyber Security Strategy Development: LeadLead the development of a comprehensive cyber security strategy that aligns with the organization’s goals and risk appetite.Define and maintain the cyber security roadmap, ensuring that it evolves to address new threats and technological advancements.Risk Management & Compliance: OverseeOversee the identification, assessment, and prioritization of cyber risks across the organization.Ensure compliance with relevant regulatory requirements, standards, and frameworks such as ISO 27001, NIST, GDPR, and others.Develop and enforce policies, procedures, and controls to mitigate identified risks.Cyber Threat Intelligence: MonitorMonitor the global threat landscape to anticipate and respond to emerging cyber threats.Collaborate with the cyber threat intelligence team to analyze threat data and provide strategic guidance on threat mitigation.Communicate threat intelligence insights to stakeholders, including executives, to inform decision-making.Security Architecture & Innovation: ProvideProvide guidance on the design and implementation of secure architecture to protect critical assets.Promote the adoption of innovative security technologies and practices that enhance the organization’s defensive posture.Evaluate and recommend security tools, technologies, and services to support the cyber security strategy.Incident Response & Management: ActAct as a senior advisor during significant security incidents, guiding the response and recovery efforts.Review and refine the incident response plan to ensure it is effective and aligned with the broader security strategy.Lead post-incident reviews to identify lessons learned and drive continuous improvement.Stakeholder Engagement & Communication:Build strong relationships with key stakeholders across the organization to ensure cyber security is integrated into business processes.Develop and deliver executive-level presentations on cyber security risks, strategies, and initiatives.Foster a culture of security awareness through targeted training programs and communications.Team Leadership & Development: MentorMentor and develop junior members of the cyber security team, providing guidance on career development and technical skills.Coordinate with other departments to ensure a cohesive approach to cyber security across the organization.Lead cross-functional teams in the execution of strategic cyber security initiatives.

Posted 10 months ago

Primary Job ObjectiveThis section summarizes the main purpose of your job and the general key responsibilities.Responsible for developing the internal audit plan based on the results of the IT and information security risk assessment, executing internal IT and information security audits, following up on the implementation of recommendations and directives resulting from internal audits, and participating in the preparation of periodic reports on the achievements and issues faced by the department.Detailed Duties and ResponsibilitiesThis section describes the main duties and responsibilities to give a complete and accurate picture of the job.• Implement administrative policies and procedures and adhere to agency policies to ensure desired administrative outcomes.• Review the policy manual and internal audit process procedures, compare them with best practices, and ensure they meet the agency’s objectives.• Develop the internal audit plan for information security based on risk assessment results.• Conduct internal audits according to the approved audit plan, submit reports and recommendations to senior management, and follow up on their implementation.• Evaluate and monitor the effectiveness of operations and compliance with the agency’s internal policies, procedures, and controls in the area of IT and information security.• Follow up on the implementation of recommendations and directives resulting from internal audits.• Prepare periodic reports on the department's achievements and issues, provide suggestions for development, and submit them to the direct manager.• Perform any other tasks assigned by the direct manager within the scope of job responsibilities.

Posted 10 months ago

Posted 10 months ago

Description:As a Security Analyst, the candidate will monitor security alerts and logs, investigate incidents, and analyze data foranomalies. They will manage security tools like SIEM, NDR, Email Security, and EDR, and implement newtechnologies. Staying updated on cybersecurity threats, they will enhance detection and response with threatintelligence. The role includes maintaining records of security incidents, preparing reports, and collaborating withsecurity and IT teams, while also mentoring junior analysts.Roles and Responsibilities:● Security Monitoring and Analysis:○ Monitor and analysis of security alerts and logs from various security systems and tools forsuspicious activities.○ Investigate and remediate security alerts and incidents.○ Correlate and analyze data to identify patterns or anomalies.● Security Tools Management:○ Maintain and configure security tools and systems, SIEM, NDR, Email Security, and EDR.○ Responsible for implementing new security tools and technologies.● Threat Intelligence:○ Stay informed about current cybersecurity threats and vulnerabilities.○ Apply threat intelligence to various solutions and technologies to enhance detection and responsecapabilities.● Documentation and Reporting:○ Maintain detailed records of security incidents, investigations, and remediation efforts.○ Prepare incident reports and documentation for management and stakeholders.○ Develop monthly security reports. Provide security incident reports● Collaboration:○ Collaborate with other security team members and IT personnel to share information and bestpractices.○ Provide guidance and mentorship to junior analysts (L1) as needed.

Posted 10 months ago

SummaryThe Senior technical risk management engineer will act as a Technical SME for Risk management team members. And will be responsible of reduction of the overall security vulnerabilities and risks of the on-boarded entities by supervising, guiding, , analyzing, reporting and driving the mitigation actions of security vulnerabilities within the network, endpoint, and infrastructures of the entity in a consistent and expeditious manner. By minimizing the internal and external IT security risks, vulnerability management helps defend against proprietary and entity data loss and reduces the ability for threat actors to carry out malicious activities against the on- boarded entity information systems.Job Responsibility• Act as Leader and SME for MOI NSCO Risk and vulnerability management team with the On-boarded entities to minimize the identified vulnerabilities.• Take responsibility and ownership for identifying and recommending solutions that minimize the risk and vulnerability of the on-boarded entity.• Provide options and recommendations for ways to achieve the aims of the Risk and vulnerability management program mange the lifecycle through to delivery• Take a pragmatic, risk based approach to delivering initiatives within the program. Balancing risk reduction, with quick wins and business need.• Provide guidance regarding technical security best practice to on-boarded entities technical teams including input into the remediation plan requirements and design changes to ensure the best results.• Understand, assess and effectively communicate security risks associated with identified vulnerabilities• Escalate identified Critical Vulnerabilities and risks to NCSOC Risk manager• Contribute to further iterations of developing Entity Risk based reports• Contribute to further iterations of developing new rules, templates and reports that should enhance the Risk and vulnerability management service offered to the on-boarded entity• Track and managed the status of Entities technical vulnerabilities until full remediation• Conduct technical Risk meetings with Entities top management and technical teams

Posted 10 months ago

Tasks:• Oversee remediation and recovery engagements with affected entities.• Review and advise on defining and prioritizing of critical business functions of the affected entity, the proposed requirements and plans for backup, restoration and disaster recovery operations.• Review and advise on the proposed compromise recovery plan.• Review and advise on architecture reviews, identified gaps, and given recommendations.• Establish yourself as a thought leader in the field of compromise remediation and recovery by writing and publishing articles, speaking and conferences, mentoring and coaching, leading and participating in new projects, and developing new initiatives for the section.• Review and advise on proposed long-term security posture improvements.• Provide expert input to the services, processes, procedures related to remediation and recovery section.• Provide expert input in remediation and recovery section goals and initiatives.• Step in as the lead of incident of national significance:• Engage with affected entities of a cyber incident during the containment and remediation phases.• Drive the incident remediation and recovery phase.• Identify and prioritize critical business functions in collaboration with organizational stakeholders.• Define and prioritize essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event.• Define appropriate levels of system availability based on critical system functions and ensure that system requirements identify appropriate disaster recovery and continuity of operations requirements to include any appropriate fail-over/alternate site requirements, backup requirements, and material supportability requirements for system recover/restoration.• Review and analyze system(s) and architecture(s) against cybersecurity architecture guidelines and best practices, recommend security services, and security mechanisms to increase the security posture.• Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.• Develop cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data primarily applicable to government organizations.• Analyze how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.• Provide advice on design concepts or design changes.• Determine the protection needs (i.e., security controls) for the information system(s) and network(s)• Develop a plan to get the affected critical business functions online.• Develop a strategy to increase the long-term security posture.• Define a cyber compromise recovery plan and process to eradicate the threat actor and regain control of the environment.• Develop and document remediation and recovery reports.• Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans.• Document the lessons learned from the incident.Skills in:• Applying and incorporating information technologies into proposed solutions.• Designing countermeasures to identified security risks.• Designing the integration of hardware and software solutions.• Determining how a security system should work and how changes in conditions, operations, or the environment will affect these outcomes.• Using virtual private network (vpn) devices and encryption.• Configuring and utilizing software-based computer protection tools (e.g., software firewalls, antivirus software) and computer protection components (e.g., hardware firewalls, servers, routers, as appropriate).• Designing multi-level security/cross domain solutions.• Using public-key infrastructure (pki) encryption and digital signature capabilities into applications (e.g., s/mime email, ssl traffic).• Setting up physical or logical sub-networks that separate an internal local area network (lan) from other untrusted networks.• Applying cybersecurity and privacy principles to organizational requirements.• Identifying cybersecurity and privacy issues that stem from connections with internal and external partner organizations.• Implementation and recovery of active directory forests including authentication services such as active directory federation services and active directory certificate services.• Troubleshooting Active Directory Replication (AD), Group Policy, DFS Replication (DFSR), supporting complex multi-forest AD topologies, authoring and triaging Group Policies in large, regulated environments, ability to identify defects or misconfiguration in AD services• Understanding and Troubleshooting Windows Server Operating System (OS) Roles.• Administering, Backup/Recovery and Troubleshooting Virtualization Platforms, Exchange, SQL Servers, Windows Servers.• Microsoft Azure Infrastructure (IaaS) management and deployment: Virtual Machines, Storage, Networking.• Troubleshooting Hybrid Identity Including Active Directory, Azure AD and technologies such as Azure AD Connect, Azure AD Password Protection.• Utilizing SIEM and SOAR platforms such as Microsoft Sentinel, Splunk, QRadar.• Utilizing Microsoft Security solutions – Endpoint security, cloud security, and identity.• Security Software Deployment at scale including troubleshooting and support for various identity platforms and solutions.• Analyzing security telemetry in relation to alerts and incidents.

Posted 10 months ago

Description:Seeking an experienced Cybersecurity Incident Response Specialist to manage containment, remediation, andrecovery of cyber incidents. Responsibilities include analyzing security architecture, developing cybersecuritydesigns, advising on system protection needs, and enhancing security posture. Expertise in Active Directory, cloudsecurity, and cybersecurity principles required.Roles and Responsibilities:● Engage with affected entities of a cyber incident during the containment and remediation phases.● Drive the incident remediation and recovery phase.● Identify and prioritize critical business functions in collaboration with organizational stakeholders.● Define and prioritize essential system capabilities or business functions required for partial or full systemrestoration after a catastrophic failure event.● Define appropriate levels of system availability based on critical system functions and ensure that systemrequirements identify appropriate disaster recovery and continuity of operations requirements to includeany appropriate fail-over/alternate site requirements, backup requirements, and material supportabilityrequirements for system recovery/restoration.● Review and analyze system(s) and architecture(s) against cybersecurity architecture guidelines and bestpractices, and recommend security services, and security mechanisms to increase the security posture.● Perform security reviews, identify gaps in security architecture, and develop a security risk managementplan.● Develop cybersecurity designs for systems and networks with multilevel security requirements orrequirements for the processing of multiple classification levels of data primarily applicable to governmentorganizations.● Analyze how the implementation of a new system or new interfaces between systems impacts the securityposture of the current environment.● Provide advice on design concepts or design changes.● Determine the protection needs (i.e., security controls) for the information system(s) and network(s)● Develop a plan to get the affected critical business functions online.● Develop a strategy to increase the long-term security posture.● Define a cyber compromise recovery plan and process to eradicate the threat actor and regain control ofthe environment.● Develop and document remediation and recovery reports.● Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans.● Document the lessons learned from the incident.Required Skills:● Applying and incorporating information technologies into proposed solutions.● Designing countermeasures to identify security risks.● Designing the integration of hardware and software solutions.● Determining how a security system should work and how changes in conditions, operations, or theenvironment will affect these outcomes.● Using virtual private network (VPN) devices and encryption.● Configuring and utilizing software-based computer protection tools (e.g., software firewalls, antivirussoftware) and computer protection components (e.g., hardware firewalls, servers, routers, as appropriate).● Designing multi-level security/cross-domain solutions.● Using public-key infrastructure (PKI) encryption and digital signature capabilities in applications (e.g.,s/mime email, SSL traffic).● Setting up physical or logical sub-networks that separate an internal local area network (LAN) from otheruntrusted networks.Applying cybersecurity and privacy principles to organizational requirements.● Identifying cybersecurity and privacy issues that stem from connections with internal and external partnerorganizations.● Implementation and recovery of active directory forests including authentication services such as activedirectory federation services and active directory certificate services.● Troubleshooting Active Directory Replication (AD), Group Policy, DFS Replication (DFSR), supportingcomplex multi-forest AD topologies, authoring and triaging Group Policies in large, regulatedenvironments, ability to identify defects or misconfiguration in AD services● Understanding and Troubleshooting Windows Server Operating System (OS) Roles.● Administering, Backup/Recovery, and Troubleshooting Virtualization Platforms, Exchange, SQL Servers,and Windows Servers.● Microsoft Azure Infrastructure (IaaS) management and deployment: Virtual Machines, Storage, Networking.● Troubleshooting Hybrid Identity Including Active Directory, Azure AD, and technologies such as Azure ADConnect, and Azure AD Password Protection.● Utilizing SIEM and SOAR platforms such as Microsoft Sentinel, Splunk, and QRadar.● Utilizing Microsoft Security solutions – Endpoint security, cloud security, and identity.● Security Software Deployment at scale including troubleshooting and support for various identityplatforms and solutions.● Analyzing security telemetry in relation to alerts and incidents.

Posted 10 months ago