Job Explanation

Emirates Nationwide Specifications Classification of Occupations

ROLE Objective:
Reporting to the top of Information Protection Engineering, the given information Security Architect – Cloud will design and handle the cloud security function. The incumbent will undoubtedly be working with CISO along with other management group in GISD closely, and will be accountable to recognize and protect all of the ADIB’s information and assets in cloud from inner and exterior threats. The part will be in charge of designing of the proper treatment for right resource to avoid unauthorized usage of all ADIB information in cloud from inner & exterior threats.
He’ll lead to co-establishing and executing the technique, partnering with various groups, top the workforce and making certain confidentiality, integrity and option of ADIB information in cloud isn’t compromised:
Growth/refinement of strategy, plan, regulatory compliance, risk mitigation and identification, cloud security specifications and architecture.
Act within an internal consultant function and can analyse, recommend, develop, put into action and maintain systems within cloud and procedures that protect customer and business information.
To are a person and in a multi-disciplinary team atmosphere to recognize security gaps, develop handles. determine functional and non-functional security style and requirements options that meet business goals while complying with protection standards.
Lead execution of cloud security options like Cloud Management Systems, Cloud Workload Security and Cloud Access Safety Broker Systems
Create cloud safety roadmap and program, coordinate and generate the look, development and execution of cloud protection options including

Crucial Accountabilities of The Function:

Manual the implementation and style of secure cloud options and services across company also it support areas.
Generating the successful implementation and construction of cloud security answers to minimize the entire risk.
Understand the tactics, techniques, and processes employed by threat actors to build up a more comprehensive general cloud security position.
Conduct person, independent security testimonials of vendor proposals, evaluation protection architectures and recommend adjustments to the given info security operation to judge risk keep your charges down or improve service.
Create a thorough knowledge of existing ADIB systems and security regulates and access ranges yielding an initial system security idea of operations, including baseline safety requirements and capabilities.
Assist as cloud protection subject material expert, trusted advisor; supply advisory and consulting solutions as needed to numerous project and department groups.
Determine suitable degrees of system availability predicated on critical system features and user access specifications: provides input on program requirements to handle appropriate disaster recuperation and continuity of functions needs
Evaluate acquisition paperwork against current and proposed safety architectures and styles.
Business lead cloud architecture security program, like the implementation and advancement of effective security style across all ADIB techniques and platforms. Enforce and create cloud security configuration protection and baselines patching for several applications, techniques, databases, OSs, and system assets.
Talk with project teams along with other system architects to build up system designs and task plans that include the correct security controls and satisfy security standards.
Prepare price estimates and identify safety issues and opportunities.
Develop cloud protection architecture and frameworks (which includes requirements, design patterns, along with other artefacts) for used in aggregating comprehensive safety architecture baselines to improve the security position throughout ADIB.
Understand current along with emerging protection threats and design safety architecture to mitigate threats where achievable.
Overseeing and approving the cloud protection architecture requirements, tasks, vendor selection, and settings to be able to maintain a unified eyesight
Style, manage, and socialize a unified cloud Protection Blueprint for technology company and functionality capabilities, in alignment with the overarching ADIB information safety policies and strategy.
Works as information protection liaison with all degrees of the IT corporation sufficient reason for the lines of company and other inner departments and companies. Participate within the contract review group for those agreements with IT or IT safety implications.
Create tips for standard contract vocabulary linked to cloud security features and/or specifications and offer technical stakeholders over the enterprise with architectural assistance from high-level style to detailed hands-on execution of security handles


BA/BS degree in Computer Technology, Information Safety or related industry of research. A master’s diploma is a surplus.
Must, firewalls, Intrusion Detection Techniques, web filtering, log and audit management, physical security manage systems, real-time techniques, and common os’s.
Understanding of security technologies, procedures, systems/applications, and acquainted with banking & finance institutions applications useful for: mobile & on-line banking, ATMs, obligations, treasury, and trade financing…etc.
Understanding of security engineering, network and system security, security and authentication protocols, cryptography, and program security
Understanding of TOGAF, SABSA, ISO 27001, NESA, PCI DSS, SWIFT along with other security criteria and rules
Background in securing multi-tenant cloud and huge data services, and/or creating separation regulates in cloud techniques.
Knowledge of large-scale cloud migration applications.
Knowledge of security needs and controls around Constant Delivery / Constant Integration.
Possesses strong company acumen, understanding agreement negotiations, budgetary disciplines, problems resolution, and also impact and collaborate with co-workers
A number of of the following specialized certifications: TOGAF, CCIE, CCSP, CISSP, CISA, CISM, CRISC, CGEIT, ITIL,etc.


Info Engineering</p or Technology

Sub Work Title

Information Protection Architect – Cloud

Apply Today

Apply for this job: Click here