42 Cyber Risk Management jobs in Egypt

Innovation Hub I Cyber Security I Risk Management Tech Lead, Cairo, Egypt

New
EGP120000 - EGP240000 Y Deloitte

Posted today

Job Viewed

Tap Again To Close

Job Description

Deloitte Innovation Hub | Cybersecurity | Risk Management Tech Lead, Cairo, Egypt.
Connect to your career at Deloitte
Deloitte
, established globally in 1845, is the world's largest and leading professional services firm, providing Audit & Assurance, Tax & Legal and Consulting and related services to public and private clients spanning multiple industries. Present in more than 150 countries, Deloitte is distinct in its ability to help clients solve their most complex problems, from strategy to implementation.

Deloitte innovation hub (DIH) is a strategic initiative established by Deloitte North & South Europe (NSE) to support our ambition to become the leading business transformation partner of choice for our clients and to expand and scale our delivery footprint across EMEA. With access to a scaled, diverse, highly skilled, motivated, and engaged workforce, DIH is delivering complex technical solutions for clients' most complex business problems, across portfolios that include 'Strategy & Transactions', 'Customer', 'Engineering, AI & Data, 'Enterprise, Technology & Performance' and 'Cyber'. DIH is aiming to become the destination for top talents in Egypt for a long, exciting career.

We invest in outstanding people of diverse talents and backgrounds and empower them to achieve more than they could elsewhere. Our work combines advice with action and integrity. We believe that when our clients and society are stronger, so are we. Our organization has grown in scale and diversity, providing services across the region, with our shared culture remaining the same. We aim to help clients realize their ambitions, make a positive difference in society, and maximize the success of our people. This drive fuels the commitment and humanity that run deep through our every action.

Connect to your opportunity
As a
Third-Party Cyber Risk Management Senior Consultant
,
you can expect to be involved in the following:

Responsibilities

  • Conduct cybersecurity and data privacy controls assessments on Third Parties and vendors in line with industry, regional and international best standards and regulations e.g. NIST CSF,ISO 27001, UAE-NESA and Information Security Regulation (ISR), GDPR and UAE PDPL.
  • Coordinate scheduling, evidence collection and responses with third party point of contact Collect and review control evidence and analyze third party information and data.
  • Review independent assurance reports and certifications (e.g. SOC1&2, ISO27001).
  • Support contract reviews and negotiations over cybersecurity requirements and clauses by working closely with procurement and legal teams.
  • Perform risk assessments and evaluate inherent and residual cybersecurity risks. Analyze the likelihood and potential impact of identified risks using qualitative and quantitative methods.
  • Determine adequate treatment plans for identified risks and control gaps, detailing findings, recommendations, and mitigation strategies.
  • Develop action plans and timelines for implementing risk controls and track remediation plans to reduce identified risks and close control
  • Collaborate with stakeholders and relevant business departments to implement risk mitigation plans and actions.
  • Maintain and monitor a third-party cybersecurity risk register for the whole organization.
  • Monitor and support in remediation activities and work with the third party to ensure findings are being remediated appropriately. Ensure all third-party cybersecurity risk management processes and SOPs are being adopted.
  • Ensure all technology integrations for the cybersecurity third party program are working effectively and technical issues are identified and resolved with respective technical teams.
  • Track key performance and risk indicators (KPIs, KRIs) to measure program performance and risk reduction over time.
  • Manage risk assessment tools and GRC solutions to support third party cybersecurity controls and risk assessments, as well as calculate risk levels and prioritize areas of concerns.
  • Administer and maintain technology platform and solutions utilized to perform third party cybersecurity and data privacy assessments.
  • Prepare and maintain documentation, including policies, procedures, standards, and guidelines that support the third-party cyber risk management framework.
  • Develop third party cybersecurity risk reports and dashboards using tools such as PowerBI.
  • Communicate and present findings to stakeholders, management, and regulatory bodies as required.
  • Liaise with key departments (e.g. Procurement, Legal, HR, operations) to address specific cybersecurity third party risk matters.
  • Conduct root cause analysis for identified cybersecurity incidents relating to third parties and work with threat and incident response teams to evaluate risks and prevent future occurrences.
  • Develop and deliver training materials to educate employees and business stakeholders on identifying and managing third party risks.
  • Research and integrate best practices for risk management within the industry and implement it in day-to-day operations to ensure continuous improvement.

Connect to your opportunity
In this role, you will play a crucial part in our comprehensive managed service to clients, focusing on essential daily operations.

  • Key Management: You will oversee the secure generation, distribution, storage, and rotation of encryption keys, ensuring the protection of sensitive transaction and card data and maintaining the integrity of payment systems.
  • Key Ceremony Preparation: You will prepare the key ceremony, where new cryptographic keys are generated, loaded and exported, using automated tools on a monthly basis to ensure precision and efficiency.
  • Practical Arrangements: You will handle all practical arrangements necessary for key management and key ceremonies, ensuring that everything runs smoothly.
  • Monthly Reporting: You will provide monthly reports to the client regarding our service level agreement (SLA) commitments, ensuring transparency and accountability.
  • Policy and Process Improvement: You will keep policies and standards up to date while continuously improving and optimizing our processes and procedures to enhance service delivery.
  • Client Contact: You will manage client communication via email, responding to queries and requests, as well as organizing key renewals and key ceremonies.

Your proactive involvement in these areas will be vital to maintaining our high standards and delivering exceptional service to our clients.

Connect To Your Skills And Professional Experience
To succeed in this role, you will need to match the following criteria:

  • Bachelor's degree in computer science, Information Security, or a related field
  • Minimum of 7 years of related experience.
  • Strong technical knowledge of cybersecurity domains (Governance, Compliance, Risk Management, Identity and Access Management, Data Security, Cryptography, Network Security, Cloud Security, Endpoint Security, Business Continuity Management, Operational Technology, Data Lifecycle Management etc)
  • Strong technical knowledge of third-party cybersecurity risk management frameworks, IT governance frameworks, regulatory requirements, and best practices.
  • Strong technical experience conducting and managing third party cybersecurity assessments.
  • Hands-on experience with security frameworks such as ISO 27001, PCI, NCA, SAMA CSF, NIST, etc.
  • Knowledge of relevant laws and regulations such as NESA ISR, UAE PDPL, GDPR, HIPAA, SOX, etc.

Preferred Certifications

  • Relevant certifications such as CISA, CRISC, CGRC, CISSP, CISM, or other equivalent certificates are highly desirable.

The Following Attributes Are Essential

  • A willingness to work as part of a diverse team.
  • A commitment to continuous improvement and lifelong learning.
  • A passion for technology and a drive to deliver s
  • An ability to remain calm under pressure whilst continuing to pay attention to detail.
  • Strong analytical and problem-solving skills.
  • Excellent communication and interpersonal abilities.
  • Ability to work effectively in a fast-paced and dynamic environment.
  • Proactive and self-motivated with a keen attention to detail.

Connect to your business – Technology & Transformation
Distinctive thinking, deep expertise, and collaborative working. That's what connects us. That's what makes us Deloitte. If you want to help solve some of the biggest challenges around, join us. Together, we'll make an impact that matters.

Personal Independence
Regulation and controls are standard practice in our industry and Deloitte is no exception. These controls provide important legal protection for both you and the firm. We are subject to several audit regulations, one of which requires that certain colleagues abide by specific personal independence constraints. This can mean that you and your "Immediate Family Members" are not permitted to hold certain financial interests (shares, funds, bonds etc.) with audit clients of the firm. The recruitment team will provide further detail as you progress through the recruitment process.

Connect with your colleagues
Location: Cairo, Egypt

"What attracted me to Deloitte were the endless opportunities and the collective experience of other like-minded individuals. Deloitte's clients include many of the world's largest organizations; I wanted to be part of a team that made a difference that I could be proud of." -Dan, Technology & Transformation

"Everyone always says "it's the people," and that's true. Working for a brand you feel proud of feels pretty good too. And you don't have any stress about fitting into a particular stereotype, because there are so many different types of people in Deloitte Digital." – Gillian, Technology & Transformation

Our commitment to you
Making an impact is more than just what we do: it's why we're here. So, we work hard to create an environment where you can experience a purpose you believe in, the freedom to be you, and the capacity to go further than ever before.

We want you. The true you. Your own strengths, perspective, and personality. So, we're nurturing a culture where everyone belongs, feels supported and heard, and is empowered to make a valuable, personal contribution. You can be sure we'll take your wellbeing seriously, too. Because it's only when you're comfortable and at your best that you can make the kind of impact you, and we, live for.

Your expertise is our capability, so we'll make sure it never stops growing. Whether it's from the complex work you do, or the people you collaborate with, you'll learn every day. Through world-class development, you'll gain invaluable technical and personal skills. Whatever your level, you'll learn how to lead.

Connect to your next step
A career at Deloitte is an opportunity to develop in any direction you choose. Join us and you'll experience a purpose you can believe in and an impact you can see. You'll be free to bring your true self to work every day. And you'll never stop growing, whatever your level.

This advertiser has chosen not to accept applicants from your region.

Risk Self-Assessment and Control Team Leader

EGP120000 - EGP240000 Y Banque du Caire

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Summary:

We are seeking a highly motivated and experienced
RCSA Team Leader
to join our Operational Risk Management team. The candidate will be responsible for Leading and supervise RCSA team and the RCSA process as well. The ideal candidate will have a strong background in operational risk, internal controls, and a proven ability to lead and mentor subordinate. This role is crucial for ensuring the effective identification, assessment, mitigation and monitoring the operational risks across Banque Du Caire.

Job Responsibilities:

  • Lead and manage RCSA analysts, providing guidance, coaching, and performance feedback.
  • Oversee the end-to-end RCSA process, including planning, execution, and reporting.
  • Drive the identification and assessment of operational risks and the effectiveness of controls.
  • Review the preparation of desk research and pre-lists of risks, including the applied control submitted from RCSA team.
  • Supervise daily operations of the RCSA team including obtain the final approval on the RCSAs from relevant departments, the action plans follow up to ensuring their implementation and reviewing the accuracy of the data entry in RCSA system.
  • Supervising the control testing process and follow up on the results of control testing in order to prepare the required reports
  • Collaborate with business unit to ensure the timely and accurate completion of RCSAs.
  • Review and challenge risk and control assessments to ensure quality, consistency, and accuracy.
  • Develop and maintain the RCSA methodology and framework, ensuring alignment with regulatory requirements and industry best practices.
  • Provide guidelines and support to business units on the RCSA process and operational risk concepts.
  • Supervise and support the RCSA team with ad-hoc projects and tasks as required by Head of RCSA.

Job Qualifications:

  • Bachelor's degree in finance, Business, Accounting, or a related field. A master's degree is a plus.
  • Minimum of 6 years of experience in banking with minimum 3 years in operational risk management, internal audit, with at least 2 years in a leadership or supervisory role.
  • Strong understanding of operational risk management frameworks, including RCSA, KRIs, ORAP, ILD, IT Risk and BCM.
  • Strong analytical, problem-solving, and communication skills.
  • Proven ability to influence and collaborate with stakeholders at all levels.
  • Strong knowledge of regulatory requirements related to operational risk (e.g., Basel, COSO, ISO
  • Professional certifications such as CORP, COSO, or ISO is highly desirable.
  • Professional Knowledge Microsoft Office Suite (Risk management system is a plus)
This advertiser has chosen not to accept applicants from your region.

Information Security Engineer

New
EGP24000 - EGP180000 Y Alexandria Business Association- SME Project)

Posted today

Job Viewed

Tap Again To Close

Job Description

Requirements:

  • Bachelor's degree in Computer Engineering, Information Technology, or related field.

  • 1–2 years of relevant experience in Information Security operations.

  • Knowledge of networking, operating systems (Windows/Linux).

  • Certifications such as CCNA, MCSA, or Linux are a plus.

  • Good understanding of firewalls and endpoint security solutions.

  • Strong problem-solving and analytical skills.

  • Applicants must be residents of Alexandria.

Job Duties:

  • Implement and monitor security measures to protect computer systems, networks, and information.

  • Identify and define system security requirements.

  • Design security architecture and develop detailed cybersecurity designs.

  • Manage and troubleshoot firewalls, endpoint security, and related security tools.

  • Respond to and investigate security incidents.

If you are interested, kindly send your updated CV to with email subject Information Security Engineer

This advertiser has chosen not to accept applicants from your region.

Information Security Engineer

EGP120000 - EGP240000 Y Balad

Posted today

Job Viewed

Tap Again To Close

Job Description

About Us

We're a growing
fintech startup
reimagining secure financial systems. Security is not a department — it's a culture. We're looking for an engineer who thrives at the intersection of
development, operations, and security
— someone eager to help us
shift security left
and embed it into our
SDLC
.

About the Role

As a
Security Software Engineer
, you will play a key role in securing our systems from design to deployment. You will work closely with engineers, DevOps, and product teams to
integrate security practices
, ensure
cloud and infrastructure safety
, and support
compliance initiatives
like ISO or PCI DSS.

What You'll Do

  • Embed security throughout the
    software development lifecycle (SDLC)
  • Build and maintain
    security tools
    , scripts, and automations
  • Integrate security controls into CI/CD pipelines
  • Conduct threat modelling, secure code reviews, and vulnerability assessments
  • Monitor and respond to incidents using
    SOC tools
    (e.g., Wazuh, Suricata, OSSIM)
  • Support and enforce
    cloud security best practices
    (AWS/Azure)
  • Collaborate with engineers to
    raise security awareness
    and fix vulnerabilities
  • Participate in and contribute to
    ISO 27001, PCI DSS
    , and similar processes
  • Document security standards and provide internal training

What We're Looking For

  • 3+ years in
    security engineering
    , DevSecOps, or a similar role
  • Strong familiarity with
    SDLC security practices and shift-left approach
  • Experience with one or more
    programming/scripting languages
    (C#, Python, Bash, etc.)
  • Experience working with
    Agile and XP teams
  • Hands-on experience with
    SOC tools
    , SIEM, and log correlation
  • Good grasp of
    cloud security (IAM, encryption, networking)
  • Familiar with
    DevOps tooling
    (CI/CD, Docker, IaC, etc.)
  • Solid foundation in
    networking protocols, firewalls, VPNs
  • Competence with
    Git-based workflows
  • Contributed to or maintained parts of
    ISO 27001, PCI DSS
    , or SOC2 programs

Nice to Have

  • Certifications:
    Security+
    ,
    CISSP
    ,
    OSCP
    ,
    CEH
    , or cloud security credentials
  • Experience with
    threat intelligence
    ,
    attack simulation tools
    , or
    bug bounty triage
  • Exposure to
    Zero Trust architectures
  • Familiarity with tools like
    Trivy, Checkov, Snyk, Owasp ZAP
  • Experience in
    incident response and postmortems

Why Join Us?

  • Flexible hours, outcome-based work
  • Culture of transparency, agility, and collaboration
  • Work with a team that values
    security as code
  • High-impact role in shaping secure fintech systems
  • A strong platform for
    growth, innovation, and leadership
This advertiser has chosen not to accept applicants from your region.

Lead-Information Security

EGP900000 - EGP1200000 Y Alshaya Group

Posted today

Job Viewed

Tap Again To Close

Job Description

Job No:

Location: Egypt

Role Profile:

The GRC Lead – Privacy, Risk & Access Management will play a pivotal role in strengthening Alshaya Group's governance, risk, and compliance posture with a core focus on data privacy, enterprise risk management, and identity & access governance. This role will also lead and support cross-functional security projects such as SSO integration and user access reviews, ensuring secure, compliant, and business-aligned identity practices across the enterprise.

The Below Key Performance Areas include but are not limited to:

 Develop and implement privacy and data protection policies aligned with GDPR, KVKK, PDPL, and other regional regulations.

Conduct DPIAs, PIAs, and privacy risk assessments to ensure responsible data handling.

anage enterprise risk through a structured Risk Management Framework and maintain the Enterprise Risk Register.

efine and enforce IAM policies including RBAC, SoD, and user access reviews.

ead or support IAM initiatives such as SSO integrations, PAM implementations, and access certification campaigns.

lign GRC and IAM practices with standards like ISO 27001, NIST, PCI DSS, and SOX.

acilitate internal and external audits, assessments, and third-party reviews.

versee GRC tools and privacy platforms (e.g., Archer, OneTrust, ServiceNow GRC).

rive cross-functional projects including policy harmonization and audit remediation.

repare executive-level reports and dashboards for governance and compliance oversight.

ct as a liaison for privacy, risk, and IAM discussions across departments.

romote GRC awareness and training across the organization.

Knowledge:

trong understanding of global privacy regulations (e.g., GDPR, KVKK, PDPL) and data protection principles.

n-depth knowledge of enterprise risk management frameworks and risk assessment methodologies.

amiliarity with IAM concepts including RBAC, SoD, SSO, PAM, and identity lifecycle management.

xperience with compliance standards such as ISO 27001, NIST, PCI DSS, and SOX.

roficiency in using GRC and privacy management tools (e.g., Archer, OneTrust, ServiceNow GRC).

bility to lead cross-functional projects and integrate GRC, IAM, and privacy workflows.

trong stakeholder engagement and communication skills for executive and cross-departmental collaboration.

nalytical skills for conducting DPIAs, PIAs, and interpreting KRIs and audit findings.

nowledge of authentication protocols (e.g., SAML, OIDC) and identity governance best practices.

xperience in managing DSARs, breach responses, and audit readiness activities.

Experience:

-7 years experience in Information Security Domain

achelor's degree in Information Security, Computer Science, Risk Management, or related field. Master's degree or MBA is a plus.

IPP/E, CIPM, or other IAPP certifications; CRISC, CISA, or ISO 27001 Lead Implementer; Identity and Access certifications such as Azure, Okta, or SailPoint; ITIL or PMP for project management is a plus.

Skills:
br>
Strong understanding of IAM principles, SSO protocols (SAML, OIDC), and identity lifecycle.

nowledge of privacy regulations and enterprise risk frameworks.

xcellent stakeholder management, communication, and cross-functional collaboration skills.

roficient in GRC tools , Privacy Tools & Access management platforms.

Advertised: 10 Sep 2025

Application close: 11 Oct 2025

This advertiser has chosen not to accept applicants from your region.

Information Security Engineer

EGP90000 - EGP120000 Y NowPay

Posted today

Job Viewed

Tap Again To Close

Job Description

About Us
NowPay (YC W21) is a FinTech startup building a financial-wellness platform for employees in emerging markets. Saving, spending, budgeting and borrowing. Those are the 4 pillars of financial-wellness. NowPay aims to improve every aspect of those for employees by building products that tackle every vertical.

NowPay enables employees to get their salaries in advance at any point in time during the month and also pay their bills instantly. NowPay is backed by YCombinator, 500 Startups, BECO Capital, Global Ventures, Endure, Plug and Play, MSA Capital, 4dx, Foundation Ventures, EFG and Beltone.

Job Description
Role Summary:
We are seeking a skilled and proactive Information Security Engineer to lead and scale NowPay's cybersecurity posture. This role is critical to securing sensitive employee financial data, ensuring the integrity of salary disbursement systems, and supporting regulatory compliance (e.g. local regulators, PCI-DSS, and GDPR). The successful candidate will be responsible for designing and enforcing best-in-class security practices across our platforms, cloud infrastructure, and internal processes.

Key Responsibilities
Security Strategy & Architecture

  • Define and continuously improve NowPay's information security strategy, policies, and controls across all layers (cloud, app, infrastructure).
  • Lead threat modeling and risk assessment activities for new and existing systems.
  • Ensure secure design of new fin-tech products including salary advance, BNPL, and bill payment services.

Vulnerability Management & Monitoring

  • Conduct regular security assessments, vulnerability scans, and penetration testing.
  • Monitor and respond to security incidents, collaborating with engineering and DevOps teams for resolution.
  • Maintain and enhance audit logging, intrusion detection, and alerting systems.

Cloud & Application Security

  • Implement secure configurations and hardening of AWS infrastructure (IAM, EC2, S3, RDS, etc.).
  • Ensure secure code practices via CI/CD pipelines, code reviews, and dependency scanning (GitHub, Jira).
  • Support the engineering team with encryption, tokenization, and data integrity mechanisms.

Compliance & Risk

  • Support compliance with relevant regulatory frameworks (local regulators, PCI-DSS, ISO
  • Manage security documentation, audits, and incident response playbooks.
  • Collaborate with legal and compliance teams on security requirements for licensing or audits.

Employee Security Enablement

  • Lead security awareness training for employees (e.g., phishing, password hygiene, secure device usage).
  • Manage identity and access management (IAM), two-factor authentication, and role-based access controls.

Requirements

  • 3+ years of experience in information security, preferably in fin-tech, banking, or SaaS environments.
  • Hands-on experience with cloud/on-site security.
  • Familiarity with regulatory and compliance standards: local regulators, GDPR, PCI-DSS, ISO 27001.
  • Proficient in tools such as Metabase, GitHub, Jira, SIEMs, firewalls, and endpoint protection systems.
  • Strong knowledge of OWASP Top 10, encryption protocols, and authentication systems.
  • Bachelor's degree in Computer Science, Information Security, or related fields.

Benefits

  • Medical insurance coverage
  • Social insurance
  • Salary advance

check(event) ; career-website-detail-template-2 => ,meta)" mousedown="lyte-button => check(event)" final- final-class="lyte-button lyteBackgroundColorBtn lyteSuccess" lyte-rendered="">

This advertiser has chosen not to accept applicants from your region.

Administrator-Information Security

EGP90000 - EGP120000 Y Alshaya Group

Posted today

Job Viewed

Tap Again To Close

Job Description

Job No:

Location: Egypt

Role Profile:

The GRC Admin will be responsible in implementing, interpreting, and ensuring compliance with information security policies. Assess and prioritize cybersecurity risks, supporting regulatory compliance, and report security metrics, maintaining governance standards, conducting risk assessments for internal systems and third-party vendors, enforcing security policies, and advising leadership on risk strategies such as mitigation, reduction, transfer, exception handling, and residual risk analysis.

The Below Key Performance Areas include but are not limited to:

 Implement a data security & privacy risk reporting framework aligned with ISO standards.

Design and document controls to ensure compliance with regulatory and internal requirements.

acilitate remediation of control gaps and escalate critical issues to leadership.

anage exception review processes and ensure periodic documentation and review.

repare for and support regulatory examinations such as PCI DSS.

ollaborate with auditors and control owners to ensure timely completion of requests.

onitor and analyze information security metrics to evaluate program effectiveness.

onduct risk assessments to identify vulnerabilities in systems and third-party products.

ecommend and implement controls to mitigate identified security risks.

ommunicate risk findings and actionable recommendations to stakeholders.

upport workforce security initiatives including awareness and training programs.

acilitate eDiscovery and data collection for investigations of policy violations.

nalyze security incidents and coordinate remediation and awareness efforts.

ontribute to the development and lifecycle management of security policies and procedures.

ollaborate across the organization to implement and enforce security policies.

Knowledge:

nderstanding of ISO standards and frameworks for information security risk reporting.

nowledge of designing and implementing technical, administrative, and physical security controls.

amiliarity with regulatory compliance requirements (e.g., GDPR, PCI DSS) and audit processes.

xperience in managing exception handling processes and compliance documentation.

bility to evaluate and improve the effectiveness of information security programs using metrics.

roficiency in conducting and documenting information security risk assessments.

nowledge of risk mitigation strategies and control implementation.

trong communication skills to convey risk findings and recommendations to stakeholders.

wareness of workforce security practices, including training and awareness programs.

xperience with eDiscovery processes and handling policy violation investigations.

nalytical skills for incident analysis and coordination of remediation efforts.

nderstanding of policy development, lifecycle management, and enforcement.

bility to collaborate across departments to implement security policies effectively.

Experience:

years experience in Information Security Domain

raduation Degree/BTech, Computer Science

ecurity +, Networking, certifications is added advantage.

Skills:
br>
Strong knowledge of information security governance, risk assessment, and compliance frameworks (e.g., GDPR, PCI DSS).

bility to develop, implement, and manage security policies, controls, and awareness programs.

roficiency in conducting risk assessments and analysing security metrics to support decision-making.

xcellent communication and collaboration skills for working with leadership, auditors, and cross-functional teams.

Advertised: 10 Sep 2025

Application close: 11 Oct 2025

This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cyber risk management Jobs in Egypt !

Information Security Manager

EGP120000 - EGP240000 Y Egyptian Banks Company

Posted today

Job Viewed

Tap Again To Close

Job Description

  • Establish and maintain the organization's Cyber Defense methodology in line with security regulations and requirements.
  • Obtain senior management endorsement for security policies, standards, and procedures by clearly articulating their benefits.
  • Investigate cybersecurity incidents and violations, reporting findings and recommendations to the CISO.
  • Respond rapidly and effectively to cybersecurity incidents in line with incident management processes.
  • Prepare periodic performance reports based on analysis and correlation of security events.
  • Oversee projects and deployments of security tools to ensure an effective security posture.
  • Lead the Security Operations Center (SOC) team, including shift planning and operational tool implementation.
  • Manage the Cyber Defense Centre and its resources to ensure operational effectiveness.
  • Maintain the security of corporate information against all internal and external threats.
  • Provide security input into the organization's strategic planning process and enterprise-level decisions.
  • Implement and maintain the organization's information security program in alignment with business objectives.
  • Raise major cybersecurity incidents directly to the CISO.

Requirements

  • Bachelor's degree in Computer Science, Information Systems, or related field.
  • 10+ years of experience in Information Security / Cyber Defense.
  • Proven experience managing SOC teams and cyber defense operations.
  • Strong knowledge of incident response, threat detection, and security monitoring.
  • Hands-on expertise with SIEM, endpoint protection, and enterprise security tools.
  • Relevant certifications (CISSP, CISM, CISA, or equivalent) preferred.
  • Strong analytical, leadership, and communication skills.
This advertiser has chosen not to accept applicants from your region.

Manager Information Security

EGP90000 - EGP120000 Y Alshaya Group

Posted today

Job Viewed

Tap Again To Close

Job Description

Job No:

Location: Egypt

Role Profile:

Alshaya employed a dedicated security team to implement and maintain the organization's information security program. Typically, this group is led by a chief information officer. The security group is generally responsible for conducting risk management, a process through which vulnerabilities and threats to information assets are continuously assessed, and the appropriate protective controls are decided on and applied. The value of an organization lies within its information and its security is critical for business operations, as well as retaining credibility and earning the trust of clients.

Information security programs are built around the core objectives of the CIA triad: maintaining the confidentiality, integrity and availability of IT systems and business data.

The below Key Performance Areas include but are not limited to:

 Define risk governance strategy and ensure alignment with business objectives

Approve control frameworks and ensure cross-functional adoption

eport risk trends and remediation status to executive leadership

overn exception policy and ensure audit readiness

nsure audit outcomes drive continuous improvement

ead enterprise-wide audit planning and regulatory alignment

resent security metrics to board-level stakeholders

trategic alignment of risk assessments with business objectives

ponsor control initiatives and allocate resources

nfluence business decisions through risk intelligence

hampion security culture and workforce engagement

overn enterprise investigation protocols and legal coordination

wn Policy enforcement governance and regulatory reporting

efine policy governance and ensure enterprise alignment

ead enterprise-wide security programs and stakeholder alignment

efine exception handling strategy and oversee execution

Knowledge (Desired):

uthority on ISO governance and regulatory alignment, ensuring frameworks are embedded across the organization.

trategic oversight of control architecture, ensuring alignment with compliance requirements and business objectives.

xecutive-level communication of risk posture, security strategy, and compliance status to leadership and stakeholders.

eadership in compliance governance, regulatory engagement, and fostering a culture of accountability.

ffective stakeholder communication and coordination during investigations and legal holds.

versight of performance measurement, continuous improvement, and reporting of security and compliance KPIs.

eads enterprise risk alignment, facilitates risk assessments, and engages executive stakeholders in mitigation strategies.

overns the full policy lifecycle, ensuring strategic alignment and enforcement of security policies.

eads enterprise-wide compliance and risk mitigation programs through cross-functional collaboration.

versees breach response, including senior management notification and crisis management coordination.

Experience

0 – 15 Years of Experience

 Manager
br>
Professional Certification: CISM, CGEIT, ISO 27001 Lead Auditor, CIPM, CRISC, CISA PCI ISA

Skills:

roficient in Risk Management: Skilled in identifying, evaluating, and mitigating enterprise-level risks.

ands-on experience with GRC tools: Practical knowledge of platforms such as Archer, ServiceNow GRC, or equivalent for managing governance, risk, and compliance workflows.

trategic oversight of security controls: Ability to design, implement, and monitor control frameworks aligned with regulatory standards.

xpertise in ISO and regulatory frameworks: Deep understanding of ISO standards and global compliance requirements (e.g., GDPR, PCI DSS).

olicy governance: Capable of managing the full lifecycle of security policies and ensuring strategic alignment with business objectives.

ompliance leadership: Drives compliance awareness and engagement across departments, including regulatory liaison.

isk communication: Communicates risk posture and mitigation strategies effectively to executive leadership and stakeholders.

ncident response coordination: Leads breach response efforts, including senior management notification and crisis handling.

erformance metrics and evaluation: Oversees the development and tracking of key performance indicators for continuous improvement.

ross-functional collaboration: Leads enterprise-wide initiatives for compliance, risk mitigation, and audit readiness.

Advertised: 10 Sep 2025

Application close: 11 Oct 2025

This advertiser has chosen not to accept applicants from your region.

information security controls

EGP120000 - EGP180000 Y البنك التجاري الدولي

Posted today

Job Viewed

Tap Again To Close

Job Description

JOB PURPOSE

To manage and oversee the Information Security Controls and Governance Team to ensure the proper enforcement of the security policies across the organization, remediate identified gaps and mitigate any potential security risks. In addition, to support the implementation of the security strategy with regards to the identity access management and governance, data classification and protection, and security controls validation.

Description

  1. Ensure proper management of the Information Security Controls and Governance resources to support ongoing business initiatives from a security controls and governance perspectives, ensuring the development of the necessary security access matrix mapped to the staff's job titles and business activities.

  2. Develop and Monitor the Information Security Controls and Governance Area's Key Performance Indicators and ensure adherence to the same. This includes monitoring of the TAT and SLAs of handling the different access management requests. In addition to the KPIs & KRIs related to the Security Controls periodic reviews and assessments.

  3. Ensure the annual review and update of the Information Security Controls and Governance area processes and procedures with the development and adherence to the developed SLAs.

  4. Manage and oversee the implementation of the Data Classification & Protection program to ensure proper classification framework is defined that helps classify and protect the bank's crown jewels and critical information assets. This includes maintaining the controls necessary to protect information and vital assets in accordance with security requirements and industry standards (privacy requirements, Personal Identifiable Information, encryption, Data Loss Prevention, data retention and destruction) for both structured and unstructured data.

  5. Ensure proper timely tracking and closure of open (internal/External) audit issues.

  6. Manage and oversee the Identity Access Management and Governance program to ensure proper governance of identities during the employment life cycle of all personnel in accordance with the security requirements and policies. including the development of the applications' security matrix.

  7. Manage and oversee the implementation of the Security Controls and Governance roadmap to ensure the planned reviews are conducted as per the predefined frequencies as well as the closure of the identified gaps in a timely manner, and ensure conducting access rights certification campaigns over the different bank systems to validate current access rights granted to employees, and ensure proper enforcements of actions identified as an outcome of the campaigns.

  8. Handle and manage exceptions and escalations to ensure proper support and alignment is in place between Information Security Controls and Governance area and the different stakeholders. This includes resolving communication conflicts to ensure a streamlined process is in place.

  9. Work collaboratively with Business units, IT teams, Audit, Legal and risk management functions to address open gaps/issues driven from internal/external audit, independent assessments and reviews as applicable, and ensure proper tracking mechanism is in place in coordination with the relevant stakeholders.

  10. Ensure proper enforcement of the developed security policies and controls including Physical and Environmental Security policy, Human Resources Security Policy, Information Governance Policy. This in addition to the URL Filtering, Internet Access Policies as well as the Data Loss Prevention Policies.

  11. Ensure adherence to the defined security controls operating model to support the different security controls requirements and communicate violations to the relevant teams. This includes managing the different security controls approvals including (Removable media access, Remote Working Access, Internet Access, External Email Access, EMM, etc.) ensuring adherence to the set SLAs and TAT.

  12. Assess and take the necessary actions towards the different policies' violations identified through the Privileged Access Management, Security Monitoring Tools such as NexThink, DLP or through the on-going SOC monitoring and reporting.

Qualifications

Qualifications & Experience

 Bachelor's degree of Engineering, Computer Science, Information Security or equivalent.

Minimum years of experience in IT, Information Security, Risk Analysis and / or Governance and Compliance

ecommended Certifications

o SANS Global Information Assurance Certification (GIAC)

o CRISC

o ISO 27001:2013 Lead implementer

o CISM

Skills

ery good command of English and Arabic languages

ery good Management and leadership skills

ery good Negotiation skills

xcellent Communication skills

Primary Location: Egypt-Giza-SMART VILLAGE BLDG. 3

Job: Back Office

Organization: FINANCE, STRATEGY, OPERATIONS & TECHNOLOGY

Shift: Day Job

Job Type: Full-time Employee

This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cyber Risk Management Jobs