Key Accountabilities: 

Role Purpose:  The Systems Specialist plays a critical role in ensuring the smooth operation, security, and scalability of the organization's IT infrastructure. This position encompasses administration and optimization of Active Directory (AD) and cloud environments, Office 365 applications, storage, and backup systems, as well as active collaboration with Information Security teams to support endpoint detection and response (EDR/XDR), Security Information and Event Management (SIEM), and Security Orchestration, Automation, and Response (SOAR) platforms. This role is also responsible for compliance, audit readiness, system monitoring, reporting, and user account management, ensuring alignment with organizational goals and regulatory requirements.

Duties and Responsibilities:

  1. Active Directory (AD) Management
    1. Administer, maintain, and optimize Active Directory (on-premises, cloud, and hybrid environments) to ensure high availability, performance, and security.
    2. Manage user accounts, groups, and permissions while ensuring adherence to the principle of least privilege.
    3. Design and implement group policies, organizational units (OUs), and role-based access control (RBAC) frameworks.
    4. Monitor AD health and resolve directory service issues, including DNS and domain controller configurations.
  1. Office 365 Administration
    1. Oversee the administration of Office 365 applications, including Exchange Online, SharePoint Online, Teams, OneDrive, and other services.
    2. Configure advanced security features such as Multi-Factor Authentication (MFA), Data Loss Prevention (DLP), and email filtering.
    3. Manage licensing, resource allocation, and user training to maximize productivity.
  2. Storage and Backup Management
    1. Design, implement, and maintain storage solutions, ensuring data availability, integrity, and scalability.
    2. Administer backup systems, execute regular data recovery tests, and maintain disaster recovery readiness.
    3. Monitor storage utilization and plan for future capacity needs, addressing potential risks proactively. 
  3. Collaborate with Information Security
    1. Collaborate with Information Security team when they implement and maintain EDR/XDR solutions for threat detection and response.
    2. Collaborate with Information Security team when they configure and monitor SIEM systems for log analysis, incident detection, and compliance reporting.
    3. Collaborate with Information Security team when they deploy SOAR solution to automate security responses and improve incident handling.
    4. Ensure compliance with organizational security policies, industry standards, and regulatory requirements.
  4. Collaborate on Threat Intelligence and Penetration Testing
    1. Monitors threat intelligence feeds- awareness or experience with any one of these platforms is advantageous. Examples: Microsoft Sentinel, Fortinet ForitSIEM, Trend Micro Deep Discovery, CrowdStrike Falcon X, Mandiant Threat Intelligence etc.
    2. Coordinates usage of penetration testing tools. Awareness or experience with any one of the tools for this purpose are good-to-have. Examples of tools are Tenable Nessus, CrowdStrike Falcon X, Fortinet FortiTester, Qualys Web Application Scanning.
    3. Documents findings and suggests remediation actions.
  5. Compliance and Audit
    1. Support IT audits by providing evidence, documentation, and reports related to system configurations, processes, and incidents.
    2. Ensure IT systems and processes align with compliance standards such as Qatar Cybersecurity Framework, GDPR, ISO 27001, or other relevant frameworks.
    3. Track and remediate vulnerabilities or gaps identified during audits or risk assessments.
  6. Monitoring and Reporting
    1. Utilize monitoring tools (e.g., Quest,  ManageEngine) to gain visibility into critical metrics such as the number of active users, login activities, and overall system performance, ensuring timely identification and resolution of potential issues.
    2. Develop and maintain detailed dashboards and regular reports for management, highlighting performance metrics, incidents, and risk status.
    3. Analyze trends in system usage, security events, and compliance to recommend improvements to the IT environment.
  7. User Support and Training
    1. Provide Tier 2/3 support for system-related issues, escalating as needed to vendors or senior IT staff.
    2. Conduct user training sessions to improve understanding of IT systems, security protocols, and new technologies.
    3. Address user account issues, password resets, and access permissions in AD and other systems.
  8. Project Collaboration and Leadership
    1. Participate in cross-functional IT projects, including cloud migrations, system upgrades, and infrastructure enhancements.
    2. Lead initiatives to evaluate and implement new technologies or services to improve system efficiency and security.
    3. Implements access controls using IAM (Identity Access Management) for Azure Active Directory.
    4. Supports encryption and backup strategies for cloud environments.
  9. Participate in Compliance and Audit Activities
    1. Supports efforts (such as providing advice to teams, reviews) to ensure compliance with regulatory standards such as GDPR, PCI DSS etc.
    2. Assists in gathering evidence for audits and addressing findings.
    3. Prepare reports and documentation as required by management.
  10. Conduct Awareness and Training Programs
    1. Assists in creating cybersecurity awareness materials and delivering training sessions.
    2. Coordinates phishing simulations and tracks user performance.
    3. Promotes best practices for password security and secure internet use.

 

Qualifications/Requirements: 
  • Must have sound fundamentals of at least any one of the following areas: networking, systems, or applications security, including encryption, authentication, access control, and intrusion detection/prevention systems.
  • Sound fundamentals of cybersecurity principles, frameworks, and regulations.
  • Basic knowledge of any one cloud platform (such as Microsoft Azure, Google Cloud
  • Platform etc.) with basic knowledge of their security features.
  • Excellent communication and interpersonal skills, with the ability to effectively engage with stakeholders at all levels of the organization. Arabic speaking candidates will be given preference.
  • Strong analytical and problem-solving abilities, with a focus on practical, risk-based solutions.
  • Experience managing security incidents and leading incident response efforts.
  • Bachelor's degree (or diploma) in computer science, information technology, cybersecurity, or a related field; advanced degree (such as  Masters) is preferred. 
  • Certifications such as CISSP(Certified Information Systems Security Professional), CISM (Certified Information Security Manage), CEH (Certified Ethical Hacker), CompTIA Security+ are good-to-have.
  • This position welcomes candidates with experience ranging from 3 to 10 years. ​​​​

 

 

Apply