Develop a comprehensive threat assessment for multiple infrastructure projects, covering a wide range of scenarios, from petty crime to terrorism, identifying and evaluating security threats, considering various factors such as location, type of property, and potential risks.
Develop the security strategy of the infrastructure projects with realistic and cost-effective strategies tailored to each client's unique needs.
Assist in prioritizing security measures based on potential risks and operational requirements, while considering factors such as budget constraints and adaptability to future changes.
Develop the mitigation measures plan, recommending appropriate security measures, including both physical and electronic solutions.
Assist in estimating cost, coordination with clients, and adapting strategies to evolving security needs.
Propose a variety of technical security solutions, including video surveillance, access control, intrusion detection, and communication systems. Collaborate with multidisciplinary design teams to integrate security systems with development infrastructure.
Develop the physical security design concepts such as landscaping and crime prevention through environmental design (CPTED).
Provide support in project coordination, tender processes, compliance reviews, through the project lifecycle activities related to security implementation.
Propose the latest security trends and innovative technologies in the field.
Requirements
Minimum 15 years’ experience in security risk management, strategy, and systems design.
Must have civil infrastructure projects experience.
Work under pressure with the ability to prioritize and plan effectively.
Middle East experience is required.
Excellent interpersonal skills.
Qualifications Masters or bachelor’s degree in engineering (Electronics, Telecommunications, Electrical or equivalent).
Desired Candidate Profile
1. Security Strategy Development
Develop Security Frameworks: Design and implement comprehensive security strategies for protecting digital and physical assets, considering factors like risk management, threat mitigation, and compliance with legal and regulatory standards.
Security Architecture Design: Oversee the design and architecture of security systems (e.g., network security, access control, surveillance systems) ensuring they are scalable, efficient, and meet organizational needs.
Incident Response Strategy: Lead the development and implementation of incident response plans, including detection, containment, and resolution of security breaches or attacks.
2. Cybersecurity Leadership
Cybersecurity Infrastructure: Direct the design and deployment of cybersecurity measures to protect organizational networks, data, and systems from cyber threats such as malware, ransomware, and hacking attempts.
Vulnerability Management: Conduct regular security assessments, vulnerability scans, and penetration testing to identify potential security weaknesses and lead efforts to patch or mitigate these vulnerabilities.
Compliance and Standards: Ensure compliance with industry standards (e.g., ISO 27001, NIST), and regulatory requirements (e.g., GDPR, HIPAA) for information security.
3. Physical Security Systems
Physical Access Control: Design and manage physical security systems, including surveillance cameras, access control systems (e.g., keycards, biometrics), and alarm systems, to protect company assets and personnel.
Facility Security: Oversee security protocols for physical spaces, ensuring safety measures are in place for buildings, data centers, or production facilities.
4. Risk Management and Threat Analysis
Threat Modeling: Conduct regular risk assessments and threat modeling to identify potential security risks, both cyber and physical. Provide recommendations for risk mitigation and prioritization.
Incident Management: Lead investigations into security breaches or incidents, performing root-cause analysis and driving improvements to prevent future issues.
5. Team Leadership and Mentorship
Lead Security Teams: Manage and mentor a team of security engineers, analysts, and technicians, ensuring that best practices are followed and team members are equipped to handle emerging security challenges.
Cross-Department Collaboration: Work with other departments (e.g., IT, legal, compliance, operations) to integrate security measures into broader business processes and strategies.
6. Continuous Improvement and Innovation
Technology Research: Stay updated on the latest security technologies and trends, and recommend innovative solutions to improve the organization’s security posture.
Security Testing and Auditing: Implement regular security audits, testing, and penetration tests to ensure systems remain secure against evolving threats.