26 Junior Security Consultant jobs in Egypt
Cyber Security Consultant
Posted today
Job Viewed
Job Description
KEY RESPONSIBILITIES
- Conduct Risk Assessment & Gap Analysis:
Perform a detailed cybersecurity risk assessment, identifying vulnerabilities and gaps in
security measures.
- Design Cybersecurity Training Materials:
Develop user-friendly training materials like guides, workbooks, and presentations on
cybersecurity best practices.
- Deliver Cybersecurity Workshops:
Conduct interactive workshops to build customer staff's skills in managing cybersecurity
threats.
- Facilitate Trainer-of-Trainers (ToT) Sessions:
Train key customer staff to deliver future cybersecurity training independently.
Prepare Pre- and Post-Training Assessments:
Create assessments to evaluate participants' knowledge before and after training
Submit Final Report:
Provide a final report summarizing training activities, results, and recommendations.
QUALIFICATIONS
- A bachelor's degree in cybersecurity, information technology, computer science, or a related
field. Additional qualifications in project management, instructional design, or related fields
are a plus.
- At least 7 years of experience in cybersecurity, with a focus on risk assessments, vulnerability
analysis, and the development of training programs. Experience in instructional design and
curriculum development is preferred.
- Proven experience in conducting Training Needs Assessments (TNA) and delivering Trainer(1)of-Trainers (ToT) sessions to ensure the sustainability of training programs.
- Strong expertise in cybersecurity best practices, risk management, data protection, and
incident response, with the ability to conduct thorough security audits and gap analysis.
- Experience working on USAID or other donor-funded projects, particularly in the MSMEs
sector or public institutions, is an advantage.
- Excellent facilitation, presentation, and communication skills in both English and Arabic, with
the ability to present complex technical concepts to non-technical stakeholders.
- Experience working in collaborative, cross-functional teams, including developers, project
managers, and other stakeholders. Familiarity with Agile methodologies and sprint planning
is a plus.
- Ability to translate technical content into user-friendly training materials, such as
PowerPoint presentations and workbooks.
- Strong report writing, documentation, and analytical skills, with the ability to meet deadlines
and manage multiple tasks.
- Flexibility to travel within Egypt for onsite workshops, as needed.
- Advanced certifications in cybersecurity (CISSP, CISM, CEH) are highly desirable. Additional
certifications in project management, Agile, or DevOps are a plus.
Network Security Consultant
Posted today
Job Viewed
Job Description
Key responsibilities include:
• This is a hands-on technical role:
• Provide tier-3 (expert level) operational support to resolve critical business issues that require deep network troubleshooting
techniques and performance analysis
• Independently own the Network Infrastructure support solving complex issues and suggest design modifications as appropriate.
Ensure SLAs are met
Responsible for performance analysis, proactive troubleshooting and capacity planning for the Network platforms.
Perform monitoring and maintenance of overall environment working with experienced team members.
Perform change controls. Update process documentation and team portals.
Participate in troubleshooting, capacity planning and analysis, performance analysis & Root Cause Analysis.
Communicate with peers and managers regarding system issues & participate in 24x7 on-call.
Automate operational tasks to make processes simpler and more robust.
Ability to handle multiple complex tasks in a dynamic environment, with tight deadlines concurrently.
Manage network service providers and matrixed resources
Refresh heat-maps and operations plans for campus networks, and all WAN, LAN, and WLAN connectivity
Monitor and analyze statistical data to develop improvement plans for network and application performance
Provide an effective network capacity plan in partnership with Network Capacity team
Develop and monitor global weekly and monthly trending reports by business sectors to justify future growth
Additional Responsibilities Include:
• Oversees the management of service level agreements (SLAs) with vendors and service providers
• Oversees and directs all aspects of the 24/7/365 mission critical network/telecommunication infrastructure
operations; including planning, supporting, and maintaining functions
• Serves as the senior-level escalation point for network operations to resolve critical incidents
• Maintains policy and procedures manual, conducts monthly service review meetings with key stakeholders,
and drive vendor governance in partnership with IT supplier relationship management leads
- • Provides leadership, management, direction, and technical oversight for the network operations department
•
Bachelor's degree in computer science/engineering, or related qualification
•
Certifications is a plus (CCNA, CCDA, CCNP, CCDP)
•
Minimum 8+ years of working in a Network / Telecommunications role, with expert level experience with MPLS, SIP, IP, Wi-Fi, SD-
•
WAN, VPN, Firewalls, etc. technologies.
•
5+ years of management skills with the ability to develop teams and cultivate talent
•
Experience of working in a multi-cultural, virtual team, across multiple geographical regions
•
Experience with technologies such as: Cisco / Juniper HSRP/VRRP, VRF, VPC, VC, LACP, Fabric Path, CPPM/f5/infoblox, VPN, SD WAN , SWG.
•
Extensive support of Routing Protocols/Technologies such BGP, OSPF, Logical Overlay, IOS-XR, MPLS VPN, Multicast.
•
Strong understanding of application communication methodologies.
•
Ability to perform TCP/IP Network traces/packet captures with solid experience interpreting results.
•
High level of confidence and competence communicating on bridges.
•
Solid background in vendor management to drive incident resolution.
•
Experience with monitoring tools and strategies.
•
Execute and analyse packet captures using NetScout, Wireshark and other related technologies.
•
Perform or participate in complex maintenance or deployment activities.
•
Create or modify documentation in response to new events and learnings.
•
Routinely provide constructive feedback for improvement opportunities
•
Ability to coordinate and direct activities across multiple teams
•
Excellent customer focus and engagement skills
•
Ability to develop solutions within a complex operational environment
•
Excellent verbal and written communications skills
•
Advanced knowledge of technical/business environment and problem determination strategies
•
Develops and maintains standard operating procedure manual and processes used by the team
SAP Security Consultant
Posted today
Job Viewed
Job Description
We are looking for a hands-on SAP Security Consultant to support the implementation and management of SAP security in a major transformation program. This role will focus on user access management, role maintenance, and compliance with corporate and regulatory security standards.
Key Responsibilities:
- Assist in the design, creation, and maintenance of SAP roles and authorizations, ensuring compliance with defined security policies.
- Support user provisioning, access requests, and role assignment, ensuring accurate and timely delivery.
- Collaborate with business, functional, and technical teams to resolve security issues and implement access changes.
- Participate in Segregation of Duties (SoD) reviews, audits, and remediation activities to maintain a compliant SAP environment.
- Maintain security documentation, tracking of issues, and reporting for management and audit purposes.
- Assist in testing security configurations, role changes, and user access scenarios.
- Apply SAP Security concepts and tools, including GRC, S/4HANA authorization objects, and role-based access control.
- Demonstrate strong analytical, problem-solving, and communication skills, ensuring smooth coordination with project teams.
- Proven experience in SAP Security implementation and management.
- Expertise in SAP roles, authorizations, and user access management.
- Familiarity with Segregation of Duties (SoD), audit processes, and remediation activities.
- Hands-on experience with SAP GRC, S/4HANA authorization objects, and role-based access control.
- Strong collaboration and communication skills to work with business, functional, and technical teams.
- Experience in testing security configurations and user access scenarios.
- Bachelor's degree in a relevant field (e.g., Computer Science, Information Technology, Engineering); certifications in SAP Security or SAP Governance, Risk, and Compliance (GRC) are a plus.
Security Architect-Consultant
Posted today
Job Viewed
Job Description
Advansys is a dynamic solutions provider focused on delivering smart, modular, and sustainable technology solutions that enhance operations, improve customer experiences, and drive business modernization. With over 400 skilled engineers, we serve 100+ enterprise customers across 14 countries. Specialized in a wide array of premium services including Business Automation, Industrial Digitization, Low code Development, Cloud Services, Warehouse Automation & Strategic Outsourcing.
Founded in 2014, Advansys is part of the INTRO Group, a private conglomerate established in 1980 with diverse investments across different business areas, oil and gas, real estate, specialized engineering, financial investment, Food & manufacturing.
Description
- Design and implement application control frameworks and secure architectural patterns.
- Develop and apply methodologies for application control risk assessments.
- Architect solutions to mitigate application vulnerabilities and enhance resilience.
- Align application controls with regulatory requirements (e.g., PCI DSS, NIST 800-53, ISO
- Drive the development and execution of application control frameworks in collaboration with vendors.
- Design application control patterns to meet audit and compliance standards.
- Architect automated frameworks for continuous application control assessments.
- Provide regular reporting to line manager on control effectiveness and gaps
- Navigate a complex and evolving IT environment, integrating security measures across diverse systems and technologies while adapting to emerging threats and changes in regulations. Ensure that all security initiatives align with the organization's overall strategy and risk management objectives.
- Security frameworks such as NESA, CIS, NIST, SOC2, ISO
- Ability to do issue analysis and root cause of all problems
- Contributes on policy preparation, regulation applicability, scoping and control decision.
- Prepares Cybersecurity controls design for IS solutions
Requirements:
- Bachelors or post graduate degree in Computer Science or equivalent field
- 8+ years Information Security experience with minimum 5 years in managing Application control assessment, vulnerability and architecture designs
- Minimum 1 Certifications in CISSP, CCSK, CCSP, Azure Security
- In-depth knowledge of regulatory standards such as PCI DSS, NESA, RBI, and international compliance requirements.
- Experience instituting organizational change with respect to security
- Good knowledge in various cloud platforms like Azure, AWS, OCI.
Benefits:
- 25 percent of the Salary in USD-
- Hybrid Working model
- Social and Medical insurance
- Transportation and Transportation allowance
- Internet Package
Information Security Engineer
Posted today
Job Viewed
Job Description
Requirements:
Bachelor's degree in Computer Engineering, Information Technology, or related field.
1–2 years of relevant experience in Information Security operations.
Knowledge of networking, operating systems (Windows/Linux).
Certifications such as CCNA, MCSA, or Linux are a plus.
Good understanding of firewalls and endpoint security solutions.
Strong problem-solving and analytical skills.
Applicants must be residents of Alexandria.
Job Duties:
Implement and monitor security measures to protect computer systems, networks, and information.
Identify and define system security requirements.
Design security architecture and develop detailed cybersecurity designs.
Manage and troubleshoot firewalls, endpoint security, and related security tools.
Respond to and investigate security incidents.
If you are interested, kindly send your updated CV to with email subject Information Security Engineer
Information Security Engineer
Posted today
Job Viewed
Job Description
About Us
We're a growing
fintech startup
reimagining secure financial systems. Security is not a department — it's a culture. We're looking for an engineer who thrives at the intersection of
development, operations, and security
— someone eager to help us
shift security left
and embed it into our
SDLC
.
About the Role
As a
Security Software Engineer
, you will play a key role in securing our systems from design to deployment. You will work closely with engineers, DevOps, and product teams to
integrate security practices
, ensure
cloud and infrastructure safety
, and support
compliance initiatives
like ISO or PCI DSS.
What You'll Do
- Embed security throughout the
software development lifecycle (SDLC) - Build and maintain
security tools
, scripts, and automations - Integrate security controls into CI/CD pipelines
- Conduct threat modelling, secure code reviews, and vulnerability assessments
- Monitor and respond to incidents using
SOC tools
(e.g., Wazuh, Suricata, OSSIM) - Support and enforce
cloud security best practices
(AWS/Azure) - Collaborate with engineers to
raise security awareness
and fix vulnerabilities - Participate in and contribute to
ISO 27001, PCI DSS
, and similar processes - Document security standards and provide internal training
What We're Looking For
- 3+ years in
security engineering
, DevSecOps, or a similar role - Strong familiarity with
SDLC security practices and shift-left approach - Experience with one or more
programming/scripting languages
(C#, Python, Bash, etc.) - Experience working with
Agile and XP teams - Hands-on experience with
SOC tools
, SIEM, and log correlation - Good grasp of
cloud security (IAM, encryption, networking) - Familiar with
DevOps tooling
(CI/CD, Docker, IaC, etc.) - Solid foundation in
networking protocols, firewalls, VPNs - Competence with
Git-based workflows - Contributed to or maintained parts of
ISO 27001, PCI DSS
, or SOC2 programs
Nice to Have
- Certifications:
Security+
,
CISSP
,
OSCP
,
CEH
, or cloud security credentials - Experience with
threat intelligence
,
attack simulation tools
, or
bug bounty triage - Exposure to
Zero Trust architectures - Familiarity with tools like
Trivy, Checkov, Snyk, Owasp ZAP - Experience in
incident response and postmortems
Why Join Us?
- Flexible hours, outcome-based work
- Culture of transparency, agility, and collaboration
- Work with a team that values
security as code - High-impact role in shaping secure fintech systems
- A strong platform for
growth, innovation, and leadership
Lead-Information Security
Posted today
Job Viewed
Job Description
Job No:
Location: Egypt
Role Profile:
The GRC Lead – Privacy, Risk & Access Management will play a pivotal role in strengthening Alshaya Group's governance, risk, and compliance posture with a core focus on data privacy, enterprise risk management, and identity & access governance. This role will also lead and support cross-functional security projects such as SSO integration and user access reviews, ensuring secure, compliant, and business-aligned identity practices across the enterprise.
The Below Key Performance Areas include but are not limited to:
Develop and implement privacy and data protection policies aligned with GDPR, KVKK, PDPL, and other regional regulations.
Conduct DPIAs, PIAs, and privacy risk assessments to ensure responsible data handling.
anage enterprise risk through a structured Risk Management Framework and maintain the Enterprise Risk Register.
efine and enforce IAM policies including RBAC, SoD, and user access reviews.
ead or support IAM initiatives such as SSO integrations, PAM implementations, and access certification campaigns.
lign GRC and IAM practices with standards like ISO 27001, NIST, PCI DSS, and SOX.
acilitate internal and external audits, assessments, and third-party reviews.
versee GRC tools and privacy platforms (e.g., Archer, OneTrust, ServiceNow GRC).
rive cross-functional projects including policy harmonization and audit remediation.
repare executive-level reports and dashboards for governance and compliance oversight.
ct as a liaison for privacy, risk, and IAM discussions across departments.
romote GRC awareness and training across the organization.
Knowledge:
trong understanding of global privacy regulations (e.g., GDPR, KVKK, PDPL) and data protection principles.
n-depth knowledge of enterprise risk management frameworks and risk assessment methodologies.
amiliarity with IAM concepts including RBAC, SoD, SSO, PAM, and identity lifecycle management.
xperience with compliance standards such as ISO 27001, NIST, PCI DSS, and SOX.
roficiency in using GRC and privacy management tools (e.g., Archer, OneTrust, ServiceNow GRC).
bility to lead cross-functional projects and integrate GRC, IAM, and privacy workflows.
trong stakeholder engagement and communication skills for executive and cross-departmental collaboration.
nalytical skills for conducting DPIAs, PIAs, and interpreting KRIs and audit findings.
nowledge of authentication protocols (e.g., SAML, OIDC) and identity governance best practices.
xperience in managing DSARs, breach responses, and audit readiness activities.
Experience:
-7 years experience in Information Security Domain
achelor's degree in Information Security, Computer Science, Risk Management, or related field. Master's degree or MBA is a plus.
IPP/E, CIPM, or other IAPP certifications; CRISC, CISA, or ISO 27001 Lead Implementer; Identity and Access certifications such as Azure, Okta, or SailPoint; ITIL or PMP for project management is a plus.
Skills:
br>
Strong understanding of IAM principles, SSO protocols (SAML, OIDC), and identity lifecycle.
nowledge of privacy regulations and enterprise risk frameworks.
xcellent stakeholder management, communication, and cross-functional collaboration skills.
roficient in GRC tools , Privacy Tools & Access management platforms.
Advertised: 10 Sep 2025
Application close: 11 Oct 2025
Be The First To Know
About the latest Junior security consultant Jobs in Egypt !
Information Security Engineer
Posted today
Job Viewed
Job Description
About Us
NowPay (YC W21) is a FinTech startup building a financial-wellness platform for employees in emerging markets. Saving, spending, budgeting and borrowing. Those are the 4 pillars of financial-wellness. NowPay aims to improve every aspect of those for employees by building products that tackle every vertical.
NowPay enables employees to get their salaries in advance at any point in time during the month and also pay their bills instantly. NowPay is backed by YCombinator, 500 Startups, BECO Capital, Global Ventures, Endure, Plug and Play, MSA Capital, 4dx, Foundation Ventures, EFG and Beltone.
Job Description
Role Summary:
We are seeking a skilled and proactive Information Security Engineer to lead and scale NowPay's cybersecurity posture. This role is critical to securing sensitive employee financial data, ensuring the integrity of salary disbursement systems, and supporting regulatory compliance (e.g. local regulators, PCI-DSS, and GDPR). The successful candidate will be responsible for designing and enforcing best-in-class security practices across our platforms, cloud infrastructure, and internal processes.
Key Responsibilities
Security Strategy & Architecture
- Define and continuously improve NowPay's information security strategy, policies, and controls across all layers (cloud, app, infrastructure).
- Lead threat modeling and risk assessment activities for new and existing systems.
- Ensure secure design of new fin-tech products including salary advance, BNPL, and bill payment services.
Vulnerability Management & Monitoring
- Conduct regular security assessments, vulnerability scans, and penetration testing.
- Monitor and respond to security incidents, collaborating with engineering and DevOps teams for resolution.
- Maintain and enhance audit logging, intrusion detection, and alerting systems.
Cloud & Application Security
- Implement secure configurations and hardening of AWS infrastructure (IAM, EC2, S3, RDS, etc.).
- Ensure secure code practices via CI/CD pipelines, code reviews, and dependency scanning (GitHub, Jira).
- Support the engineering team with encryption, tokenization, and data integrity mechanisms.
Compliance & Risk
- Support compliance with relevant regulatory frameworks (local regulators, PCI-DSS, ISO
- Manage security documentation, audits, and incident response playbooks.
- Collaborate with legal and compliance teams on security requirements for licensing or audits.
Employee Security Enablement
- Lead security awareness training for employees (e.g., phishing, password hygiene, secure device usage).
- Manage identity and access management (IAM), two-factor authentication, and role-based access controls.
Requirements
- 3+ years of experience in information security, preferably in fin-tech, banking, or SaaS environments.
- Hands-on experience with cloud/on-site security.
- Familiarity with regulatory and compliance standards: local regulators, GDPR, PCI-DSS, ISO 27001.
- Proficient in tools such as Metabase, GitHub, Jira, SIEMs, firewalls, and endpoint protection systems.
- Strong knowledge of OWASP Top 10, encryption protocols, and authentication systems.
- Bachelor's degree in Computer Science, Information Security, or related fields.
Benefits
- Medical insurance coverage
- Social insurance
- Salary advance
check(event) ; career-website-detail-template-2 => ,meta)" mousedown="lyte-button => check(event)" final- final-class="lyte-button lyteBackgroundColorBtn lyteSuccess" lyte-rendered="">
Administrator-Information Security
Posted today
Job Viewed
Job Description
Job No:
Location: Egypt
Role Profile:
The GRC Admin will be responsible in implementing, interpreting, and ensuring compliance with information security policies. Assess and prioritize cybersecurity risks, supporting regulatory compliance, and report security metrics, maintaining governance standards, conducting risk assessments for internal systems and third-party vendors, enforcing security policies, and advising leadership on risk strategies such as mitigation, reduction, transfer, exception handling, and residual risk analysis.
The Below Key Performance Areas include but are not limited to:
Implement a data security & privacy risk reporting framework aligned with ISO standards.
Design and document controls to ensure compliance with regulatory and internal requirements.
acilitate remediation of control gaps and escalate critical issues to leadership.
anage exception review processes and ensure periodic documentation and review.
repare for and support regulatory examinations such as PCI DSS.
ollaborate with auditors and control owners to ensure timely completion of requests.
onitor and analyze information security metrics to evaluate program effectiveness.
onduct risk assessments to identify vulnerabilities in systems and third-party products.
ecommend and implement controls to mitigate identified security risks.
ommunicate risk findings and actionable recommendations to stakeholders.
upport workforce security initiatives including awareness and training programs.
acilitate eDiscovery and data collection for investigations of policy violations.
nalyze security incidents and coordinate remediation and awareness efforts.
ontribute to the development and lifecycle management of security policies and procedures.
ollaborate across the organization to implement and enforce security policies.
Knowledge:
nderstanding of ISO standards and frameworks for information security risk reporting.
nowledge of designing and implementing technical, administrative, and physical security controls.
amiliarity with regulatory compliance requirements (e.g., GDPR, PCI DSS) and audit processes.
xperience in managing exception handling processes and compliance documentation.
bility to evaluate and improve the effectiveness of information security programs using metrics.
roficiency in conducting and documenting information security risk assessments.
nowledge of risk mitigation strategies and control implementation.
trong communication skills to convey risk findings and recommendations to stakeholders.
wareness of workforce security practices, including training and awareness programs.
xperience with eDiscovery processes and handling policy violation investigations.
nalytical skills for incident analysis and coordination of remediation efforts.
nderstanding of policy development, lifecycle management, and enforcement.
bility to collaborate across departments to implement security policies effectively.
Experience:
years experience in Information Security Domain
raduation Degree/BTech, Computer Science
ecurity +, Networking, certifications is added advantage.
Skills:
br>
Strong knowledge of information security governance, risk assessment, and compliance frameworks (e.g., GDPR, PCI DSS).
bility to develop, implement, and manage security policies, controls, and awareness programs.
roficiency in conducting risk assessments and analysing security metrics to support decision-making.
xcellent communication and collaboration skills for working with leadership, auditors, and cross-functional teams.
Advertised: 10 Sep 2025
Application close: 11 Oct 2025
Information Security Manager
Posted today
Job Viewed
Job Description
- Establish and maintain the organization's Cyber Defense methodology in line with security regulations and requirements.
- Obtain senior management endorsement for security policies, standards, and procedures by clearly articulating their benefits.
- Investigate cybersecurity incidents and violations, reporting findings and recommendations to the CISO.
- Respond rapidly and effectively to cybersecurity incidents in line with incident management processes.
- Prepare periodic performance reports based on analysis and correlation of security events.
- Oversee projects and deployments of security tools to ensure an effective security posture.
- Lead the Security Operations Center (SOC) team, including shift planning and operational tool implementation.
- Manage the Cyber Defense Centre and its resources to ensure operational effectiveness.
- Maintain the security of corporate information against all internal and external threats.
- Provide security input into the organization's strategic planning process and enterprise-level decisions.
- Implement and maintain the organization's information security program in alignment with business objectives.
- Raise major cybersecurity incidents directly to the CISO.
Requirements
- Bachelor's degree in Computer Science, Information Systems, or related field.
- 10+ years of experience in Information Security / Cyber Defense.
- Proven experience managing SOC teams and cyber defense operations.
- Strong knowledge of incident response, threat detection, and security monitoring.
- Hands-on expertise with SIEM, endpoint protection, and enterprise security tools.
- Relevant certifications (CISSP, CISM, CISA, or equivalent) preferred.
- Strong analytical, leadership, and communication skills.