<br />
<b>Notice</b>:  Function _load_textdomain_just_in_time was called <strong>incorrectly</strong>. Translation loading for the <code>jetpack</code> domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the <code>init</code> action or later. Please see <a href="https://developer.wordpress.org/advanced-administration/debug/debug-wordpress/">Debugging in WordPress</a> for more information. (This message was added in version 6.7.0.) in <b>/home/wathefty/public_html/jobs/wp-includes/functions.php</b> on line <b>6170</b><br />
<br />
<b>Notice</b>:  Function _load_textdomain_just_in_time was called <strong>incorrectly</strong>. Translation loading for the <code>rank-math</code> domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the <code>init</code> action or later. Please see <a href="https://developer.wordpress.org/advanced-administration/debug/debug-wordpress/">Debugging in WordPress</a> for more information. (This message was added in version 6.7.0.) in <b>/home/wathefty/public_html/jobs/wp-includes/functions.php</b> on line <b>6170</b><br />
<br />
<b>Notice</b>:  Function _load_textdomain_just_in_time was called <strong>incorrectly</strong>. Translation loading for the <code>advanced-ads</code> domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the <code>init</code> action or later. Please see <a href="https://developer.wordpress.org/advanced-administration/debug/debug-wordpress/">Debugging in WordPress</a> for more information. (This message was added in version 6.7.0.) in <b>/home/wathefty/public_html/jobs/wp-includes/functions.php</b> on line <b>6170</b><br />
{"id":251915,"date":"2022-11-14T15:13:16","date_gmt":"2022-11-14T12:13:16","guid":{"rendered":"https:\/\/wathefty.com\/jobs\/2022\/11\/14\/ts-controller-cyber-security\/"},"modified":"2022-11-14T15:13:16","modified_gmt":"2022-11-14T12:13:16","slug":"ts-controller-cyber-security","status":"publish","type":"post","link":"https:\/\/wathefty.com\/jobs\/2022\/11\/14\/ts-controller-cyber-security\/","title":{"rendered":"TS Controller &#8211; Cyber Security"},"content":{"rendered":"<p>TS Controller &#8211; Cyber Security\t<\/p>\n<h2>\u0627\u0644\u0648\u0635\u0641 \u0627\u0644\u0648\u0638\u064a\u0641\u064a<\/h2>\n<p>About the Role:<\/p>\n<p>Primary role in tactical cyber-attack evaluation, exploit testing and analysis, cyber intelligence, and red or purple teaming. Candidate will have experience in using tactical expertise in exploit testing, and exploit proof-of-concept development and analysis. <\/p>\n<p><\/p>\n<p>The candidate will need to have experience in conducting technical research and identifying methods to detect emerging cyber threats, emulating full-life cycle cyber-attack methodologies, and have a deep, technical understanding of evolving Advanced Persistent Threat (APT) Tactics, Techniques, and Procedures (TTPs).<\/p>\n<p><\/p>\n<p>Key accountabilities include:<\/p>\n<ul>\n<li>Strong experience with conducting penetration tests and executing red team engagements.<\/li>\n<li>Relevant experience in information security and adversary simulation<\/li>\n<li>Detailed knowledge of global cyber threats, threat actors, and the tactics, techniques and procedures used by cyber adversaries.<\/li>\n<li>Proficient in exploitation and post exploitation frameworks such as Cobalt Strike, Metasploit Framework, Empire.<\/li>\n<li>Strong knowledge of core Information Technology concepts such Windows &amp; Active Directory, Unix\/Linux<\/li>\n<li>Drive continuous improvement through active collaboration with threat simulation, vulnerability management, and technical architecture.<\/li>\n<li>Efficiently consume threat intelligence and convert threat intelligence into actionable rules and alerts.<\/li>\n<\/ul>\n<h2>\u0627\u0644\u0648\u0635\u0641 \u0627\u0644\u0648\u0638\u064a\u0641\u064a<\/h2>\n<h2>\u0627\u0644\u0645\u0647\u0627\u0631\u0627\u062a<\/h2>\n<p>About you:<\/p>\n<ul>\n<li>Minimum 5 years leading critical incident response efforts.<\/li>\n<li>Graduate in Computer \/ Engineering or equivalent.<\/li>\n<li>Focused on penetration testing by imitating real-world attack techniques and methods<\/li>\n<li>Full-stack knowledge to understand modern attacks that involve networks, infrastructure, compute and applications<\/li>\n<li>Ability to work independently and handle multiple tasks concurrently with strong written and verbal communication.<\/li>\n<li>Industry Certifications like OSCP, GPEN, GWAPT, GPEN<\/li>\n<\/ul>\n<h2>\u0627\u0644\u0645\u0647\u0627\u0631\u0627\u062a<\/h2>\n<h2>\u062a\u0641\u0627\u0635\u064a\u0644 \u0627\u0644\u0648\u0638\u064a\u0641\u0629<\/h2>\n<dl>\n<dt>\u0645\u0646\u0637\u0642\u0629 \u0627\u0644\u0648\u0638\u064a\u0641\u0629<\/dt>\n<dd> \u0627\u0644\u062f\u0648\u062d\u0629, \u0642\u0637\u0631 <\/dd>\n<dt>\u0642\u0637\u0627\u0639 \u0627\u0644\u0634\u0631\u0643\u0629<\/dt>\n<dd>\u062e\u062f\u0645\u0627\u062a \u062f\u0639\u0645 \u0627\u0644\u0637\u064a\u0631\u0627\u0646<\/dd>\n<dt>\u0637\u0628\u064a\u0639\u0629 \u0639\u0645\u0644 \u0627\u0644\u0634\u0631\u0643\u0629<\/dt>\n<dd>\u0635\u0627\u062d\u0628 \u0639\u0645\u0644 (\u0627\u0644\u0642\u0637\u0627\u0639 \u0627\u0644\u062e\u0627\u0635)<\/dd>\n<dt>\u0646\u0648\u0639 \u0627\u0644\u062a\u0648\u0638\u064a\u0641<\/dt>\n<dd>\u062f\u0648\u0627\u0645 \u0643\u0627\u0645\u0644<\/dd>\n<dt>\u0627\u0644\u0631\u0627\u062a\u0628 \u0627\u0644\u0634\u0647\u0631\u064a<\/dt>\n<dd>\u063a\u064a\u0631 \u0645\u062d\u062f\u062f<\/dd>\n<dt>\u0639\u062f\u062f \u0627\u0644\u0648\u0638\u0627\u0626\u0641 \u0627\u0644\u0634\u0627\u063a\u0631\u0629<\/dt>\n<dd>1<\/dd>\n<\/dl>\n<h2>\u062a\u0641\u0627\u0635\u064a\u0644 \u0627\u0644\u0648\u0638\u064a\u0641\u0629<\/h2>\n<h2>\u0627\u0644\u0645\u0631\u0634\u062d \u0627\u0644\u0645\u0641\u0636\u0644<\/h2>\n<dl>\n<dt>\u0639\u062f\u062f \u0633\u0646\u0648\u0627\u062a \u0627\u0644\u062e\u0628\u0631\u0629<\/dt>\n<dd>\u0627\u0644\u062d\u062f \u0627\u0644\u0623\u062f\u0646\u0649: 5 \u0627\u0644\u062d\u062f \u0627\u0644\u0623\u0642\u0635\u0649: 10<\/dd>\n<dt>\u0627\u0644\u0634\u0647\u0627\u062f\u0629<\/dt>\n<dd>\u0628\u0643\u0627\u0644\u0648\u0631\u064a\u0648\u0633\/ \u062f\u0628\u0644\u0648\u0645 \u0639\u0627\u0644\u064a<\/dd>\n<\/dl>\n<h2>\u0627\u0644\u0645\u0631\u0634\u062d \u0627\u0644\u0645\u0641\u0636\u0644<\/h2>\n<p><a href=https:\/\/www.bayt.com\/ar\/qatar\/jobs\/ts-controller-cyber-security-4623083\/>Original Article<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>TS Controller &#8211; Cyber Security<br \/>\n\u0627\u0644\u0648\u0635\u0641 \u0627\u0644\u0648\u0638\u064a\u0641\u064a<\/p>\n<p>About the Role:<br \/>\nPrimary role in tactical cyber-attack evaluation, exploit testing and analysis, cyber intelligence, and red or purple teaming. Candidate will have experience in using tactical expertise in exploit testing, and exploit proof-of-concept development and analysis. <\/p>\n<p>The candidate will need to have experience in conducting technical research and identifying methods to detect emerging cyber threats, emulating full-life cycle cyber-attack methodologies, and have a deep, technical understanding of evolving Advanced Persistent Threat (APT) Tactics, Techniques, and Procedures (TTPs).<\/p>\n<p>Key accountabilities include:<br \/>\nStrong experience with conducting penetration tests and executing red team engagements.Relevant experience in information security and adversary simulationDetailed knowledge of global cyber threats, threat actors, and the tactics, techniques and procedures used by cyber adversaries.Proficient in exploitation and post exploi..<\/p>\n","protected":false},"author":2,"featured_media":40604,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_ti_tpc_template_sync":false,"_ti_tpc_template_id":"","spay_email":"","footnotes":""},"categories":[11,35],"tags":[],"class_list":["post-251915","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-11","category-__"],"jetpack_featured_media_url":"https:\/\/wathefty.com\/jobs\/wp-content\/uploads\/2022\/07\/\u0648\u0638\u0627\u0626\u0641-\u0627\u0644\u0623\u0631\u062f\u0646.png","_links":{"self":[{"href":"https:\/\/wathefty.com\/jobs\/wp-json\/wp\/v2\/posts\/251915","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wathefty.com\/jobs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wathefty.com\/jobs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wathefty.com\/jobs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wathefty.com\/jobs\/wp-json\/wp\/v2\/comments?post=251915"}],"version-history":[{"count":0,"href":"https:\/\/wathefty.com\/jobs\/wp-json\/wp\/v2\/posts\/251915\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wathefty.com\/jobs\/wp-json\/wp\/v2\/media\/40604"}],"wp:attachment":[{"href":"https:\/\/wathefty.com\/jobs\/wp-json\/wp\/v2\/media?parent=251915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wathefty.com\/jobs\/wp-json\/wp\/v2\/categories?post=251915"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wathefty.com\/jobs\/wp-json\/wp\/v2\/tags?post=251915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}