Analyze cyber defense policies, configurations, and evaluate compliance with organizational directives and relevant regulations.
Maintain a deployable cyber defense audit toolkit (software and hardware) to support audit missions and stay up to date on applicable compliance documents.
Prepare audit reports identifying technical and procedural findings, with recommended remediation strategies.
Conduct both technical and nontechnical risk and vulnerability assessments across computing environments, infrastructure, networks, and applications.
Review vulnerability data from sources like penetration tests and scans, assess risks to business assets, and support vulnerability remediation reporting.
Improve and automate the vulnerability management lifecycle, including data ingestion, compliance metrics, and asset detection.
Collaborate with technology teams and business stakeholders to implement protective security solutions and communicate risks with cost-effective recommendations.

We're a Cairo-based IT recruitment & employment assistance company who endeavor to improve specialized IT recruitment and job finding. Our goal is to ensure that in the vast field of Information Technology the right people are brought into the right place.