Al-Haffar | AlHaffar – The Specialist in Job Search in United Arab Emirates
Internal Audit
Key Responsibilities:
Participate in the development of risk-based annual audit plans, considering the unique challenges and opportunities within an IT product company.
Lead or support the execution of internal audits, including financial, operational, compliance, and IT audits (e.g., IT General Controls, application controls, data security, cloud environments).
Conduct thorough walkthroughs, testing, and data analysis to assess the design and operating effectiveness of controls.
Identify control deficiencies, evaluate their risk implications, and develop practical, value-added recommendations.
Assess the company's risk landscape, with a particular focus on technology-related risks (e.g., cybersecurity, data privacy, system integrity, business continuity).
Ensure compliance with internal policies, industry standards, and relevant regulatory requirements (e.g., SOX, GDPR, ISO 27001).
Stay abreast of emerging technologies, industry best practices, and regulatory changes that may impact the company's risk profile.
Prepare clear, concise, and impactful audit reports detailing findings, recommendations, and action plans.
Present audit results and insights to management and relevant stakeholders, fostering constructive dialogue and promoting a culture of continuous improvement.
Security Software Engineer
Requirements:
Experience: Minimum 4+ years of hands-on experience in security software development or a closely related role.
Programming Expertise: Deep proficiency in at least one modern secure programming language (e.g., Python, C/C++, Go, Rust, Java).
Cryptographic Mastery: Strong understanding and practical application of cryptography, including TLS, JWT, OAuth protocols.
Security Domain Knowledge: Proven experience in secure API development, web/mobile application security, OS-level security (Linux, Windows, Kernel), and cloud-native/container security (Docker, Kubernetes).
Threat Landscape Acumen: Familiarity with SIEM, threat intelligence, threat hunting.
Highly Desirable: Background in ethical hacking or exploit development.
Certifications: Preferred certifications include OSWE, OSED, OSCP, CEH, CISSP, or equivalent.
Mindset: A demonstrable security-first mindset in all aspects of software design and development.
Skills: Exceptional problem-solving, critical thinking, and collaborative abilities.
↚
Application Steps:
- Open the application link
- Browse the available jobs and select the one that suits you.
- Click on "Apply Now" and enter the required information.
- Ensure that your details are entered correctly, then click "Submit".
- Open the application link
- Browse the available jobs and select the one that suits you.
- Click on "Apply Now" and enter the required information.
- Ensure that your details are entered correctly, then click "Submit".