Expoint – all jobs in one place
מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

דרושים Arabic Translator - Tax Zakat Cairo ב-Ey ב-Egypt, Cairo

מצאו את ההתאמה המושלמת עבורכם עם אקספוינט! חפשו הזדמנויות עבודה בתור Arabic Translator - Tax Zakat Cairo ב-Egypt, Cairo והצטרפו לרשת החברות המובילות בתעשיית ההייטק, כמו Ey. הירשמו עכשיו ומצאו את עבודת החלומות שלך עם אקספוינט!
חברה (1)
אופי המשרה
קטגוריות תפקיד
שם תפקיד (1)
Egypt
Cairo
נמצאו 51 משרות
09.12.2025
EY

EY Manager - Tech Consulting Cybersecurity Penetration Testing ... Egypt, Cairo, Cairo

Limitless High-tech career opportunities - Expoint
Manage and oversee offensive security engagements, including:. Web, mobile, APIs, thick client, and cloud penetration testing. Internal/external network and wireless security assessments. Red team and purple team operations (including OSINT,...
תיאור:

Manager - Cyber Security - Offensive Security Specialist

As a Manager in Offensive Security, you will lead the delivery of offensive security services, oversee client engagements, and manage a team of consultants. You will be responsible for ensuring high-quality delivery of penetration testing, red/purple team engagements, and adversary simulations. This role combines technical expertise, client advisory, and team leadership, with additional responsibilities in business development and innovation. The client base spans various sectors and includes collaboration with other teams within Advisory services.

Your key responsibilities

  • Manage and oversee offensive security engagements, including:
    • Web, mobile, APIs, thick client, and cloud penetration testing
    • Internal/external network and wireless security assessments
    • Red team and purple team operations (including OSINT, social engineering, and physical security assessments)
  • Define methodologies, frameworks, and toolkits for red team and adversarial simulations aligned to MITRE ATT&CK, Cyber Kill Chain, and the Diamond Model.
  • Guide the use of C2 frameworks (Cobalt Strike, Brute Ratel, NightHawk, Havoc, Sliver, Mythic, Merlin) and Breach & Attack Simulation (BAS) platforms in client engagements.
  • Review and validate advanced tradecraft such as EDR/AV evasion, C2 infrastructure setup, malware development, and offensive R&D.
  • Translate complex technical risks into business-relevant insights for executive level, producing executive-ready reports and presentations.
  • Act as the subject matter expert (SME) for client discussions, workshops, and industry events
  • Drive pre-sales and business development activities, including proposal development, scoping sessions, and client relationship management.
  • Manage accounts and relationships on a day-to-day basis and explore new business opportunities for the firm.
  • Assist in developing new methodologies and internal initiatives and help in creating a positive learning culture by coaching, counselling and developing junior team members.
  • Ensure compliance with local and international cybersecurity frameworks (e.g., NCA ECC/DCC, ISO 27001, PCI DSS).
  • Manage multiple engagements, ensuring timely delivery, quality assurance, and adherence to industry best practices.
  • Responsible for overall client service quality delivery in accordance with EY quality guidelines & methodologies

Skills and attributes for success

  • Leadership and people management, with the ability to grow and retain high-performing teams.
  • Strong project management skills, ensuring engagements are delivered on time, on budget, and at high quality.
  • Excellent business acumen, with the ability to contribute to go-to-market strategies and service development.
  • Ability to balance hands-on technical oversight with strategic advisory.
  • Ability to interpret complex technical results and present insights to business stakeholders.
  • Strong analytical, problem-solving, and critical-thinking skills.
  • Excellent communication and collaboration skills
  • Deep technical understanding of offensive security methodologies.

To qualify for the role, you must have

  • A bachelor's or master’s degree in information technology, cyber security etc.
  • 7–10 years of experience in penetration testing which includes internet, intranet, web application penetration tests, wireless, social engineering, and Red Team assessments., with at least 2–3 years in a leadership or managerial role.
  • Knowledge of Windows, Linux, UNIX, any other major operating systems.
  • Deep understanding of TCP/IP network protocols and experience with various Active Directory attack techniques.
  • Understanding of network security and popular attacks vectors.
  • In-depth understanding of OWASP Top 10 vulnerabilities and their mitigation strategies. Experience with manual attack and penetration testing.
  • Experience to lead a technical team to conduct remote and on-site penetration testing within defined rules of engagement.
  • Proven track record in leading red/purple team operations, adversarial simulations, and social engineering campaigns.
  • Perform in-depth analysis of penetration testing results and create report that describes findings, exploitation procedures, risks and recommendations.
  • Recognized certifications such as OSCP, OSWE, OSEP, OSEE, GXPN, CRTO2, SANS LDR551, GPEN, GWAPT.
  • Exposure to offensive R&D, malware development, and automation for scaling engagements is highly desirable.
  • Strong business development/ account management and client relationship skills.
  • A valid passport for travel.
  • Excellent communication skills with a consulting mindset.

Ideally, you’ll also have

  • Project management skills.
  • Relevant certifications such as OSCP, OSCE, OSWE, OSEP, OSEE, GXPN, CRTO, SANS GWAPT, GPEN.
  • Strong understanding of security frameworks and methodologies (e.g., MITRE ATT&CK, OWASP, NIST).

What we offer

We offer a competitive compensation package where you’ll be rewarded based on performance and recognized for the value you bring to our business. Plus, we offer:

  • Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
  • Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
  • Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
  • Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.

If you can demonstrate that you meet the criteria above, please contact us as soon as possible.

EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.

Show more
09.12.2025
EY

EY Manager - Tech Consulting Cybersecurity CMS Cairo Egypt, Cairo, Cairo

Limitless High-tech career opportunities - Expoint
Lead end-to-end SOC and Threat Management engagements from design to operation. Deliver cyber threat monitoring, threat hunting, and incident response engagements for a diverse range of clients. Define SOC target...
תיאור:

As part of our Cyber Technology Consulting leadership team, you will lead and deliver SOC transformation and Threat Management programs for clients across the MENA region. You will oversee the full lifecycle of SOC design, implementation, and optimization, guide detection and response strategy, and manage multi-disciplinary teams to enhance clients’ cyber resilience and operational maturity. You'll collaborate closely with clients to mature their security operations while working with cross-functional teams across our Advisory practice.

This role presents an exceptional opportunity to help organizations enhance their cyber resilience, strengthen threat detection capabilities, and ensure effective response to complex security incidents. You will work closely with CISOs and executive stakeholders to define regional SOC strategies and lead high-impact threat management programs that advance national and enterprise-level cyber defense maturity.

Your key responsibilities

  • Lead end-to-end SOC and Threat Management engagements from design to operation.
  • Deliver cyber threat monitoring, threat hunting, and incident response engagements for a diverse range of clients.
  • Define SOC target operating models, governance frameworks, and capability roadmaps.
  • Manage SOC transformation projects, including process re-engineering, technology integration, and staffing models.
  • Guide clients in establishing 24x7 monitoring models, incident escalation procedures, and operational runbooks.
  • Lead major security incident response efforts, including cyber crisis simulation and executive tabletop exercises.
  • Define, develop, and refine detection engineering strategies, including use case development, alert logic, correlation rules, and automation using SIEM, SOAR, and XDR platforms.
  • Conduct SOC maturity and capability assessments, aligning findings with NIST CSF, MITRE ATT&CK, and regional cybersecurity frameworks (e.g., NCA ECC/DCC).
  • Provide strategic advisory on threat detection optimization, cyber defense posture, and incident response readiness.
  • Act as engagement lead, ensuring delivery quality, client satisfaction, and adherence to timelines and budgets.
  • Integrate threat intelligence and proactive hunting programs into SOC workflows.
  • Develop detailed reports and executive-ready recommendations, effectively communicating technical findings to all stakeholders.
  • Mentor and supervise junior and senior consultants, fostering technical growth and knowledge sharing.
  • Contribute to business development, proposals, and go-to-market initiatives for SOC services.
  • Collaborate with other Cyber Competencies (e.g., Cloud Security, Incident Response, OT Security) to deliver integrated client solutions.

Skills and attributes for success

  • Proven leadership in SOC build, operate, or transformation projects.
  • Strong technical background in SIEM, SOAR, and EDR/XDR platforms, including architecture, rule finetuning, and end-to-end use case lifecycle development.
  • In-depth understanding of the threat intelligence lifecycle, attacker TTPs, and emerging threats such as APT, ransomware, and insider threats.
  • Hands-on knowledge of MITRE ATT&CK, NIST CSF and incident handling best practices.
  • Experience in developing SOC playbooks, use cases, KPIs, and SOC operating models.
  • Ability to communicate technical/complex cyber risks and threats effectively to both technical and non-technical stakeholders, including senior management.
  • Proven experience managing large-scale SOC transformation and threat detection programs across diverse client environments.
  • Collaborating with other members of the engagement team to develop the engagement plan, timelines, risk assessments and other documents/templates.
  • Ability to analyze and interpret complex technical results and present insights to business stakeholders.
  • Strong analytical, problem-solving, and critical-thinking skills.
  • Excellent communication and collaboration skills.

To qualify for the role, you must have

  • Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field.
  • 6–10 years of experience in SOC operations, Threat Management, or Cyber Defense, with at least 3 years in a leadership or management role.
  • Demonstrated experience leading SOC transformations or large-scale cyber defense programs.
  • Strong client management and engagement delivery skills.
  • Excellent written and verbal communication skills with executive presence.
  • Valid passport and willingness to travel across MENA for client engagements.

Ideally, you’ll also have

  • Industry-recognized certifications such as GCIA, GCED, GCIH, GCFA, CISSP, CCSP, or equivalent.
  • Familiarity with threat intel feeds (e.g., MISP, Anomali, Recorded Future) and TIP platforms.
  • Experience integrating AI/ML use cases into SOC environments (e.g., behavioral/anomaly detection use cases).
  • Exposure to SOC-as-a-Service delivery models, hybrid SOC architectures, and MSSP integration.

What we offer

We offer a competitive compensation package where you’ll be rewarded based on performance and recognized for the value you bring to our business. Plus, we offer:

  • Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
  • Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
  • Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
  • Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.

If you can demonstrate that you meet the criteria above, please contact us as soon as possible.

EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.

Show more

משרות נוספות שיכולות לעניין אותך

09.12.2025
EY

EY Senior Consultant - Risk Consulting Financial Crime & Compli... Egypt, Cairo, Cairo

Limitless High-tech career opportunities - Expoint
Analyzing financial and operational results of companies through the preparation of various analysis by reviewing financial statements . Preparing/evaluating financial information - helping in preparing reports and schedules . Analyzing...
תיאור:

We’re looking for Assistant Managers with expertise in

Your key responsibilities

  • Analyzing financial and operational results of companies through the preparation of various analysis by reviewing financial statements 
  • Preparing/evaluating financial information - helping in preparing reports and schedules 
  • Analyzing the financial statements to identify liquidity issues and areas of distress 
  • Develop comprehensive and sophisticated financial models for various restructuring scenarios, including, restructuring options and cash flows
  • Conduct detailed financial analysis to assess potential risks and opportunities, and provide strategic suggestions for business restructuring.
  • Review and modify financial models to accommodate changes in market trends and business strategies.
  • Build end-to-end Power BI Dashboards for internal/external data vizualisation
  • Collaborate with cross-functional teams to understand business needs, objectives, and strategies.
  • Keep up-to-date with current trends, best practices, regulatory issues, and changes that impact the company's financial modelling activities.

Skills and attributes for success

  • Solid understanding of principles and techniques of financial modelling.
  • Proficiency in Microsoft Office Suite with advanced Excel skills.
  • Strong understanding of financial concepts, including the ability to analyze financial statements.
  • Proven ability to work and make decisions in a fast-paced environment.
  • Excellent analytical, problem-solving, and decision-making skills.
  • Strong organizational skills with the ability to manage multiple projects simultaneously and meet deadlines.
  • Solid experience of using financial software and databases.
  • Exceptional verbal and written communication skills.

To qualify for the role, you must have

  • Chartered Accountancy/ MBA in Finance from a premiere institute 
  • 5-7 years of PQE in:
  • Management Consultancy firms, preferably Big 4 or financial analytics firms: McKinsey, Bain, BCG, Deloitte, PwC or KPMG o
  • Large Indian corporates with exposure in restructuring activities, analytics, financial modelling and corporate finance role 
  • Exposure to IBC or equivalent code
Show more

משרות נוספות שיכולות לעניין אותך

08.12.2025
EY

EY Senior / Technology Risk Cairo Egypt, Cairo, Cairo

Limitless High-tech career opportunities - Expoint
Expertise in Risk and Governance Frameworks, including IT governance frameworks (e.g., COBIT, ITIL, NIST), ISO 27001 standards, information security principles, policy development, and risk assessment. Proficiency in IT Systems Audit,...
תיאור:

To support the significant growth of our Technology Risk service in MENA, EY is looking to hire highly qualified resources. Specifically, as part of this job posting, we are looking for a Senior Consultant / Assistant Manager. Working across many different industries, this role will be responsible for executing and leading IT and cybersecurity projects. It is all about listening to our clients, asking the better questions, and supporting them in areas where there are no off-the-shelf solutions.

Your key responsibilities

An existing track record of successful engagement delivery in Technology Risk is expected of all candidates for this role. A Big 4 background or comparable consulting experience is highly advantageous. A broad background across IT and Cybersecurity is expected with specific experience in the following areas:

  • Expertise in Risk and Governance Frameworks, including IT governance frameworks (e.g., COBIT, ITIL, NIST), ISO 27001 standards, information security principles, policy development, and risk assessment.
  • Proficiency in IT Systems Audit, encompassing planning, execution, audit methodologies, complex IT environment evaluation, control weakness identification, and effective communication of findings.
  • Comprehensive knowledge of internal controls over financial reporting (ICFR), covering ITGCs, ITACs, SOX requirements, supporting financial audits with IT expertise, and strong liaison skills with financial auditors.
  • Good understanding around the application systems such as SAP, Oracle, Microsoft Dynamics and operating systems and databases.
  • Strong understanding of Business Continuity Planning (BCP), including BCP/DRP principles, business impact analyses, recovery strategy development, and plan testing.
  • Strong understanding of cybersecurity fundamentals, including common threats, vulnerabilities, basic principles, and contributions to cybersecurity discussions.
  • General Skills: Excellent analytical, problem-solving, communication, presentation, project management, organizational, leadership, client service, and business development skills.

Skills and attributes for success

  • Bachelor's degree in Information Technology, Cybersecurity, Computer Science, or in a related field.
  • Relevant professional certifications (e.g., CISA, CISSP, CISM, ISO 27001 Lead Auditor) are preferred.
  • Minimum of 3 to 5 years of experience in IT audit, information security, or related fields.
  • Strong knowledge of ITGC/ITAC, information security frameworks, and cybersecurity best practices.
  • Excellent analytical, problem-solving, and communication skills.
  • Ability to work independently and collaboratively within a team environment.

Show more

משרות נוספות שיכולות לעניין אותך

08.12.2025
EY

EY Arabic Translator - Tax Zakat Cairo Egypt, Cairo, Cairo

Limitless High-tech career opportunities - Expoint
Translate official documents, circulars, tax rulings, and legal texts from Arabic to English and vice versa. Ensure translations maintain the original meaning, tone, and intent, especially in legal and financial...
תיאור:

To provide accurate and contextually appropriate translation of documents, reports, regulations, and communications related to Tax and Zakat matters (including VAT, Excise, Corporate Income Tax, and Withholding Tax), ensuring linguistic precision and compliance with legal and regulatory standards.

Your key responsibilities

  • Translate official documents, circulars, tax rulings, and legal texts from Arabic to English and vice versa.
  • Ensure translations maintain the original meaning, tone, and intent, especially in legal and financial contexts.
  • Collaborate with tax advisors, legal teams, and auditors to clarify terminology and ensure consistency.
  • Review and edit translated materials for accuracy, grammar, and formatting.
  • Maintain a glossary of zakat and tax-related terminology to ensure consistency across documents.
  • Support the communication team in translating press releases, website content, and public awareness materials.

To qualify for the role

  • Bachelor’s degree in Translation, Linguistics, or a related field.
  • Professional certification in translation (e.g., ATA, CIOL) is a plus.
  • Minimum 3 years of experience in legal or financial translation, preferably in CPA firms.
  • Excellent command of Arabic and English (written and spoken).
  • Familiarity with MENA and Saudi tax regulations and zakat principles.
  • Strong attention to detail and ability to work under tight deadlines.

Building a better working world

Show more

משרות נוספות שיכולות לעניין אותך

07.12.2025
EY

EY Tech Consulting - Cybersecurity IAM Cairo Egypt, Cairo, Cairo

Limitless High-tech career opportunities - Expoint
Execute IAM transformation programs across identity lifecycle management, access governance, privileged access management (PAM), single sign-on (SSO), and multi-factor authentication (MFA). Conduct maturity assessments, define IAM roadmaps, and develop IAM...
תיאור:

As part of our Cyber Technology Consulting team, you will execute Identity and Access Management (IAM) engagements for clients across the MENA region. You will work closely with clients to design, implement, and mature IAM strategies, solutions, and governance aligned with their business and compliance needs. The client base spans various sectors and includes collaboration with other teams across Advisory services.

Your key responsibilities

  • Execute IAM transformation programs across identity lifecycle management, access governance, privileged access management (PAM), single sign-on (SSO), and multi-factor authentication (MFA).
  • Conduct maturity assessments, define IAM roadmaps, and develop IAM operating models aligned with regulatory and business requirements.
  • Oversee the implementation and integration of IAM platforms (e.g., SailPoint, Saviynt, MS Entra CyberArk, Okta, Ping, Oracle IAM).
  • Work with stakeholders across IT, security and business functions to establish effective IAM governance and role-based access controls (RBAC).
  • Conduct access risk reviews, identity attestation processes, and support audit and compliance initiatives.
  • Ensure alignment with global IAM standards and security frameworks (e.g., NCA ECC/DCC, NIST, ISO 27001, Zero Trust, CIS Controls).
  • Develop detailed reports, articulate technical findings, and deliver actionable recommendations to both technical teams and executive stakeholders.

Skills and attributes for success

  • Strong understanding of IAM principles including identity lifecycle, authentication, federation, authorization, and access certification.
  • Experience working in IAM engagements with cross-functional teams and third-party vendors.
  • Ability to articulate technical IAM solutions to both technical and non-technical stakeholders.
  • Proficiency in IAM tools and platforms such as CyberArk, SailPoint, Saviynt, MS Entra, Okta, Azure AD, or Oracle IAM.
  • Ability to define role-based access controls (RBAC) and Segregation of Duties (SoD) for business applications
  • Strong grasp of regulatory IAM requirements
  • Experience with cloud IAM models
  • Excellent communication, analytical, and problem-solving skills.
  • Collaborating with other members of the engagement team to plan the engagement and develop work program timelines, risk assessments and other documents/templates.
  • Ability to interpret complex technical results and present insights to business stakeholders.
  • Strong analytical, problem-solving, and critical-thinking skills.
  • Excellent communication and collaboration skills

To qualify for the role, you must have

  • A bachelor's degree in information technology, cyber security etc.
  • 4–6 years of relevant experience in IAM domain including IAM Governance, solution design, deployment, or integration.
  • Good understanding of identity lifecycle management, authentication/authorization, federation protocols, and directory services.
  • Knowledge of regulatory frameworks and compliance requirements (e.g., GDPR, HIPAA, SOX, ISO 27001, NCA ECC/DCC).
  • Hands-on experience with at least two IAM technology platforms (e.g., SailPoint, CyberArk, ForgeRock, Okta, Ping, Azure AD).
  • Familiarity with cloud identity and federation services (AWS IAM, Azure AD, GCP IAM).
  • An analytical and problem-solving mindset with the ability to bridge business and technical requirements.
  • A valid passport for travel.
  • Excellent communication skills with a consulting mindset.

Ideally, you’ll also have

  • Industry-recognized certifications such as CISSP, CISM, IAM certs such as SailPoint Certified IdentityNow/IdentityIQ, Saviynt IGA Professional, Saviynt PAM Professional, CyberArk Defender/Sentry, or Okta Certified Professional.
  • Experience with Zero Trust architecture and cloud-native IAM solutions.
  • Familiarity with automation, DevSecOps, and identity governance integration in CI/CD pipelines.
  • Exposure to customer IAM (CIAM) and identity threat detection.

What we offer

We offer a competitive compensation package where you’ll be rewarded based on performance and recognized for the value you bring to our business. Plus, we offer:

  • Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
  • Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
  • Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
  • Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.

If you can demonstrate that you meet the criteria above, please contact us as soon as possible.

EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.

Show more

משרות נוספות שיכולות לעניין אותך

Limitless High-tech career opportunities - Expoint
Manage and oversee offensive security engagements, including:. Web, mobile, APIs, thick client, and cloud penetration testing. Internal/external network and wireless security assessments. Red team and purple team operations (including OSINT,...
תיאור:

Manager - Cyber Security - Offensive Security Specialist

As a Manager in Offensive Security, you will lead the delivery of offensive security services, oversee client engagements, and manage a team of consultants. You will be responsible for ensuring high-quality delivery of penetration testing, red/purple team engagements, and adversary simulations. This role combines technical expertise, client advisory, and team leadership, with additional responsibilities in business development and innovation. The client base spans various sectors and includes collaboration with other teams within Advisory services.

Your key responsibilities

  • Manage and oversee offensive security engagements, including:
    • Web, mobile, APIs, thick client, and cloud penetration testing
    • Internal/external network and wireless security assessments
    • Red team and purple team operations (including OSINT, social engineering, and physical security assessments)
  • Define methodologies, frameworks, and toolkits for red team and adversarial simulations aligned to MITRE ATT&CK, Cyber Kill Chain, and the Diamond Model.
  • Guide the use of C2 frameworks (Cobalt Strike, Brute Ratel, NightHawk, Havoc, Sliver, Mythic, Merlin) and Breach & Attack Simulation (BAS) platforms in client engagements.
  • Review and validate advanced tradecraft such as EDR/AV evasion, C2 infrastructure setup, malware development, and offensive R&D.
  • Translate complex technical risks into business-relevant insights for executive level, producing executive-ready reports and presentations.
  • Act as the subject matter expert (SME) for client discussions, workshops, and industry events
  • Drive pre-sales and business development activities, including proposal development, scoping sessions, and client relationship management.
  • Manage accounts and relationships on a day-to-day basis and explore new business opportunities for the firm.
  • Assist in developing new methodologies and internal initiatives and help in creating a positive learning culture by coaching, counselling and developing junior team members.
  • Ensure compliance with local and international cybersecurity frameworks (e.g., NCA ECC/DCC, ISO 27001, PCI DSS).
  • Manage multiple engagements, ensuring timely delivery, quality assurance, and adherence to industry best practices.
  • Responsible for overall client service quality delivery in accordance with EY quality guidelines & methodologies

Skills and attributes for success

  • Leadership and people management, with the ability to grow and retain high-performing teams.
  • Strong project management skills, ensuring engagements are delivered on time, on budget, and at high quality.
  • Excellent business acumen, with the ability to contribute to go-to-market strategies and service development.
  • Ability to balance hands-on technical oversight with strategic advisory.
  • Ability to interpret complex technical results and present insights to business stakeholders.
  • Strong analytical, problem-solving, and critical-thinking skills.
  • Excellent communication and collaboration skills
  • Deep technical understanding of offensive security methodologies.

To qualify for the role, you must have

  • A bachelor's or master’s degree in information technology, cyber security etc.
  • 7–10 years of experience in penetration testing which includes internet, intranet, web application penetration tests, wireless, social engineering, and Red Team assessments., with at least 2–3 years in a leadership or managerial role.
  • Knowledge of Windows, Linux, UNIX, any other major operating systems.
  • Deep understanding of TCP/IP network protocols and experience with various Active Directory attack techniques.
  • Understanding of network security and popular attacks vectors.
  • In-depth understanding of OWASP Top 10 vulnerabilities and their mitigation strategies. Experience with manual attack and penetration testing.
  • Experience to lead a technical team to conduct remote and on-site penetration testing within defined rules of engagement.
  • Proven track record in leading red/purple team operations, adversarial simulations, and social engineering campaigns.
  • Perform in-depth analysis of penetration testing results and create report that describes findings, exploitation procedures, risks and recommendations.
  • Recognized certifications such as OSCP, OSWE, OSEP, OSEE, GXPN, CRTO2, SANS LDR551, GPEN, GWAPT.
  • Exposure to offensive R&D, malware development, and automation for scaling engagements is highly desirable.
  • Strong business development/ account management and client relationship skills.
  • A valid passport for travel.
  • Excellent communication skills with a consulting mindset.

Ideally, you’ll also have

  • Project management skills.
  • Relevant certifications such as OSCP, OSCE, OSWE, OSEP, OSEE, GXPN, CRTO, SANS GWAPT, GPEN.
  • Strong understanding of security frameworks and methodologies (e.g., MITRE ATT&CK, OWASP, NIST).

What we offer

We offer a competitive compensation package where you’ll be rewarded based on performance and recognized for the value you bring to our business. Plus, we offer:

  • Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
  • Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
  • Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
  • Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.

If you can demonstrate that you meet the criteria above, please contact us as soon as possible.

EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.

Show more
בואו למצוא את עבודת החלומות שלכם בהייטק עם אקספוינט. באמצעות הפלטפורמה שלנו תוכל לחפש בקלות הזדמנויות Arabic Translator - Tax Zakat Cairo בחברת Ey ב-Egypt, Cairo. בין אם אתם מחפשים אתגר חדש ובין אם אתם רוצים לעבוד עם ארגון ספציפי בתפקיד מסוים, Expoint מקלה על מציאת התאמת העבודה המושלמת עבורכם. התחברו לחברות מובילות באזור שלכם עוד היום וקדמו את קריירת ההייטק שלכם! הירשמו היום ועשו את הצעד הבא במסע הקריירה שלכם בעזרת אקספוינט.