Qureos

FIND_THE_RIGHTJOB.

Technology Operation Support Engineers

  • Create, log, and track CRs and SRs.
  • Coordinate with internal teams and vendors for execution.
  • Monitor progress and ensure timely delivery.
  • Provide regular updates and escalate issues as needed.
  • Ensure proper closure and documentation of requests.
  • Ensure following the process and not exceeding the SLA among teams.
  • Providing periodic reports.
  • Communicate with internal and external parties for any planned or unplanned activity.
  • Certified in PMP and ITIL
  • should have the right to Audit and Assess the provided solution at any time.
  • The solution should be on premises
  • All employees working on the solution shall be on site, no remote working is allowed.
  • System should have Data encryption at rest, display, and in-motion.
  • Integration with SIEM, and the system must have a logging capability. (Audit logging, security logging)

o System must produce logs to be stored on file on the server level or streamed to SIEM.

o System must generate audit trails of all activities done by the admin/user/customer such as (creating meetings, meeting reminders, etc.).

o System must generate security logs of each activity to cover (Login, logout, password reset, password change, change of permissions, change of roles, etc.)

o System must store logs for at least 30 days and then archived for one year with sharing process of how to restore archives during security incidents.

o System must generate event logs when logs are tampered with or changed.

o System must have protected logs from tampering or deleting.

o System must generate logs when configuration changed by admin/user.

o System must generate logs when files or folders are changed.

o Databases are tables to store data and won’t be accepted as logs.

o System must provide enriched data on the event log where it shows (Src IP, Dest IP, event type, time, user, actioned user, details of action, any additional information that might support cybersecurity cases).

o Middleware systems that transfer logs are not accepted as log sources.

o System must generate logs on all attempts including successful, or failed attempts.

o System must generate logs when start, stop, restart, of system processes and events.

  • Integration with AD/LDAP.
  • Role-based access control (RBAC) access control.
  • Multi-factor Authentication.
  • If the system supports multiple user rules the permission should be defined
  • Implement a strong password policy
  • A secure session management system that includes authentication, session locking, and session expiration.

© 2026 Qureos. All rights reserved.