Information Security Officer (ISO)
Majid Al Futtaim Retail
Definition of the information strategy:
Define objectives and needs in term of information security.
Develop Information security strategy.
Define and implement processes.
Define IT security Policies and Procedures
Governance of information security:
Supervising of information security for all countries.
Coordination of activities of information security for all countries.
Implementation of information security file.
Monitoring countries security.
Evaluation of risks, threats, and associated impacts.
Gather all elements which allow decision making.
Study of solutions ensuring the security and usage conditions.
Provide thought leadership and direction for Information Security
Outline prevention planning concerning integrity, availability and confidentiality of the information and of the components of the information system.
Awareness and training in security issues:
Awareness of the General Management.
Implementation of training program for the Operational Departments.
Develop security charter.
Advise and assist the teams.
Promoting security to all users.
Study of solutions and recommendations:
Technical validation of security tools/solutions.
Providing services and security solutions.
Definition of the security standards.
Definition of security rules.
Assure that the security programs are conducted according to the pre-established plans.
Preparation and publication of security performance indicators.
Guarantee that all teams have all measures to manage security effectively.
Determining the vulnerabilities of the company.
Providing security investigation services.
Manage change management process to review change requests and all other changes which have security implications or impact.
Establish data classification and protection process
Technology monitoring and foresight:
Monitoring legal and technical changes in information security systems.
Monitoring the required developments to ensure the logical and physical security of the information system.
Skills and Knowledge:
Ability to coordinate the work of an IT expert team.
High motivation, high autonomy.
Large capacity of initiative and excellent negotiation skills.
Strong ability to communicate.
Strong capacity for analysis and synthesis.
Knowledge in security of technologies of information in the internet field, capability to manage a laboratory environment and to create test environments for security solutions.
Professional experience in IT new technologies, evaluation/audit of information systems security.
Excellent written and verbal communication skills
Very good presentation, documentation skills
Very good knowledge of information security best Practices.
Professional Information Security certification would be highly beneficial, e.g. CISSP, CISM.
Knowledge of Arabic is advantageous.
About the Company
About the Company
Recognized as one of the most active shopping concept developers throughout the region, the Group first introduced the hypermarket model to the Middle East in 1995. Majid Al Futtaim Retail manages Majid Al Futtaim Hypermarkets, a joint venture company with the worlds second largest retailer Carrefour, and offers shoppers the same quality, variety and value-for-money that have made the brand a household name to millions over the world.
In the last 3 years, Majid Al Futtaim Hypermarket has opened 14 new Stores. In the expansion of Carrefour across the region currently there are 37 hypermarkets in the Middle East. In the coming year of 2010, Majid Al Futtaim Retail expects to open 10 new stores.