The ideal candidate will have a strong track record in OT security, coupled with the ability to bridge the gap between IT and OT domains. This role is instrumental in safeguarding critical infrastructure and operations.
Client Details
A top-tier semi government entity in Dubai.
Description
Develop and implement a comprehensive cybersecurity strategy aligned with business objectives and industry best practices.Lead and manage a high-performing cybersecurity team responsible for protecting both IT and OT systems.Provide strategic direction and oversight for the design, implementation, and maintenance of cybersecurity controls and measures.Conduct risk assessments and vulnerability analysis to identify and mitigate potential threats.Manage relationships with OT/IT vendors, ensuring alignment with security standards and compliance requirements.Stay abreast of emerging cybersecurity threats and trends, and proactively address potential risks.Collaborate with cross-functional teams to promote a strong security culture.Oversee incident response planning and execution, ensuring timely and effective mitigation of cyber incidents.
Profile
UAE National with Family Book or Marsoom (REQUIRED)Proven track record in cybersecurity leadership with a minimum of 10 years of experience.Deep understanding of OT security principles, standards, and best practices.Hands-on experience in managing OT/IT vendors and building strong partnerships.Strong knowledge of cybersecurity frameworks and compliance regulations (e.g., NIST, ISO 27001, IEC 62443).Excellent communication and interpersonal skills to effectively collaborate with stakeholders at all levels.Strong analytical and problem-solving abilities. Relevant certifications (e.g., CISSP, CISA, CISM) preferred.
Job Offer
Opportunity to work closely with executive leadership on high impact engagementsExposure to multinational environment
Skills
Head of Cybersecurity, OT Security, IT Security, Cyber Security, Operational Technology, Information Technology, Risk Management, Vendor Management, Cybersecurity Strategy, Incident Response