Cairo, Egypt
4 days ago
Cybersecurity Architect

Job Description:

Responsibilities  :_

Assess complex IT environments and map the data flow through systems, applications, and functionsAssess the current architecture and solution limitations, and define and design system specifications and working parameters for new solutionsDevelop and deploy incident response plans and cybersecurity proceduresDesign, build, implement, and support enterprise-class information security systemsPlan, research, and design robust security architectures for assigned IT projectsPerform security assessments, including security program reviews, penetration testing, vulnerability testing, and risk analysisIdentify IT security design gaps and define proposed changes or enhancementsDesign action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threatsResearch, plan, evaluate, and engineer security technology, products, and solutionsDefine and maintain security policies and procedures aligned to industry best practicesManage large-scale programsReview and recommend security configuration and policies for firewalls, VPN systems, routers, IDS scanning technologies, and serversReview and analyze system logs, SIEM tools, and network traffic for unusual or suspicious activityTest new security software, tools, and technology to determine their best use within our organizationProvide security architecture and engineering expertise across company projects and initiativesProvide Tier-2 support to cybersecurity staff in response to security-related incidentsIdentify and communicate current and emerging IT security threats

Skills and Experience  :_

Experience in a cybersecurity roleExperience in security design or technical evaluationExperience in security operations management, incident management, and governanceExperience designing and implementing technical solutions for network security, including firewall, proxy services, VPN/remote access, intrusion detection and prevention, and software-defined network securityExperience with security protocols including SSL, HTTPS, SSH, PGP, PKI, and/or KerberosExperience with system orchestration and control infrastructure elements, API integration frameworks, Openstack, or similar system control environmentsExperience developing technical evaluation plans and technical reports Knowledge of vulnerability scanners and interpreting resultsKnowledge of manual configuration review for different operating systems and database servers based on the CIS benchmarksKnowledge of database and operating system securityKnowledge of common security standards and frameworks

At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.

Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.

Por favor confirme su dirección de correo electrónico: Send Email