Qureos

Find The RightJob.

Information Security Specialist

  • Design and maintain enterprise security architecture based on industry frameworks (SABSA, TOGAF, NIST, Zero Trust).
  • Develop and document security models, including conceptual, logical, and physical architecture diagrams.
  • Define security requirements for new systems, applications, cloud services, and data flows.
  • Perform threat modeling and risk assessments for projects and solutions.
  • Evaluate security technologies (IAM, DLP, EDR, SIEM, WAF, CASB, SWG, ZTNA) and recommend suitable solutions.
  • Design secure network architectures, including segmentation, DMZ, micro-segmentation, and secure communication channels.
  • Architect cloud security controls across IaaS, PaaS, SaaS using Azure, AWS, OCI best practices.
  • Develop data protection strategies, including encryption, key management, tokenization, and data classification.
  • Review solution designs and HLD/LLD to ensure compliance with security standards and frameworks.
  • Lead security architecture reviews for new projects, integrations, and major system upgrades.
  • Define identity and access management strategies, including RBAC/ABAC, MFA, and privileged access models.
  • Collaborate with SOC, GRC, DevOps, and Network teams to align technology, monitoring, and governance.
  • Develop reference architectures and security blueprints for repeatable implementation.
  • Assess third-party vendors and technologies for security risks and architecture compliance.
  • Implement Defense-in-Depth strategies across network, application, data, identity, and endpoint layers to ensure layered security controls.
  • Define and enforce Least Privilege principles across all systems, applications, and identities, ensuring minimum required access is granted.
  • Design and manage enterprise access control models, including RBAC, ABAC, and policy-based access controls aligned with organizational requirements.
  • Develop secure identity models, ensuring strong authentication, authorization, and policy enforcement using MFA, PAM, and centralized IAM.
  • CISSP, with CCSP or CCSK is mandatory requirements, and more than 7 years of work experience in the relevant security domain.

© 2026 Qureos. All rights reserved.