{bc}

IT/OT Cybersecurity Assessment

K20s Kinetic TechnologiesDubai, UAE1 weeks agoSenior
Senior

Skills

cybersecurityinformation securitynetwork security

About This Role

Skills

should have:

Cybersecurity vulnerability assessment

Network Penetration test

Scope

The consultant will utilize industry best practices, methodologies and tools throughout the project to ensure that the assessment is comprehensive, accurate, and will offer the highest riskreduction potential in accordance with what NCA requirements on that regard Scope of penetration tests which must cover Internet-facing services and its technical components including infrastructure, websites, web applications, mobile apps, email and remote access The chosen vendor will perform an extensive cybersecurity vulnerability assessment, including penetration testing and risk assessment. This will involve a thorough examination of the current state of the Information technology network and Industrial Control System (DCS and SCADA) cybersecurity posture within the project company. The vendor will develop a plan for mitigating vulnerabilities and create a prioritized roadmap for enhancing the system(s) cybersecurity position. Within 180 days of reporting the vulnerabilities, the vendor will conduct revalidation to confirm the closure of any issues.

Throughout the project, the consultant will utilize industry best practices, methodologies, and tools to ensure that the assessment is comprehensive and accurate, and that it offers the highest potential for risk reduction in accordance with NCA requirements.

Specifically, the scope of the penetration tests will cover Internet-facing services and their technical components, including infrastructure, websites, web applications, mobile apps, email, and remote access.

This exercise will be divided into the below phases:

Phase (One): Cybersecurity vulnerability assessment:

The work includes, but is not limited to, assessing the following:

IT& ICS security policies and procedures

Network infrastructure, including PCs, servers, routers, firewalls, and switches

System configuration, including installed applications.

Network, firewall and network security policies and access rules.

Current security programs, devices and measures in place, such as anti-virus, antimalware, and intrusion detection and prevention

Wireless network components (if exist)

ICS Internet connectivity.

ICS System Connectivity to corporate Network.

Time system and time synchronization across the plant.

Surveillance system (CCTV)

Susceptibility to advanced persistent threats (APTs) and viruses.

1.Network Penetration test (Grey Box Test)

Conducting External Network Penetration test on IT/ICS external connections, the security penetration testing should help identify weaknesses that might be exploited by external attackers:

All ICS External Connections should be evaluated in terms of business advantages and security risks

External Network layer penetration testing is to be performed on network range of IP allocated to the company.

Consider future threats the Company may be exposed to, by the application links on the Internet like exposures to Man in the middle attack; malware attacks and Man in the browser attack (including its variants) and recommendation for minimizing the attack.

Vendor to identify every vulnerable port/service/aspect in the network layer and communicate with the company and seek approval for exploiting.

If authorized, will perform the exploitation and leave an evidence as will be agreed.

2. Application Penetration Test (Grey Box Test)

Awarded vendor is requested to conduct Application level penetration testing externally using grey-box scenario.

A brief knowledge of applications will be provided (if required).

To cover all of the OWASP Top 10 vulnerabilities.

To perform an automated Application Security Vulnerability test/check/scan using reputed scanners.

Risk assessment is to be performed using approved risk assessment methodology.

Vendor to identify every vulnerable service in the application layer and communicate with the company and seek approval for exploiting.

If authorized, will perform the exploitation and leave an evidence as will be agreed

Application level source code review is specifically excluded from this scope.

Phase (Three) RevalidationTest

In this phase, the Vendor will perform vulnerabilities closure /mitigation verification of vulnerabilities reported within 180 days of the final report.

This will include one-time iteration of the rescan / verification of all findings identified in phase-1 till Phase-3.

Deliverables

1.

A written report documenting the following:

a.

An executive summary detailing the ICS s cybersecurity position

b.

A report outlining identified cybersecurity vulnerabilities and gaps

c.

A recommended mitigation plan(s) including a prioritized road map of activities

d.

An estimated range of the total costs to implement the recommended mitigation plan(s).

e.

An itemized cost estimate for each proposed component, including all licensing, support, maintenance and hosting, and annual costs for subscription-based services.

f.

The report should be in power point presentation as well as a comprehensive report in word format.

g.

Each finding should be supported by appropriate evidence like screen capture, data, etc. and tools used or method followed to arrive at the finding.

Each finding should be classified based on the severity and provide detail implication, testing procedure after fixing the issue.

h.

Each finding should include the priority and criticality of the system based on CIAcriteria (Criticality, Integrity and Availability).

Your resume, rewritten for this exact role.

Sign up free — Base Career tailors your CV to this job description in 60 seconds.

01 / 05

Resume Tailored to This Job

Resume Tailored to This Job

Your keywords, structure, and story — rewritten to match this exact role and pass ATS filters.

Get My Free Resume

Free · No card · 60 seconds

02 / 05

Cover Letter for This Role, Done

Cover Letter for This Role, Done

Job-specific cover letters written in Gulf professional tone — ready in seconds, not hours.

Get My Cover Letter

Free · No card · 60 seconds

03 / 05

See How Well You Fit This Role

See How Well You Fit This Role

AI match score with clear reasons — know your fit before investing time in the application.

Check My Fit Score

Free · No card · 60 seconds

04 / 05

Apply in One Click

Apply in One Click

Autofill any application form on Workday, LinkedIn, Bayt, Greenhouse — with your tailored content.

Start Applying Faster

Free · No card · 60 seconds

05 / 05

Track It. Follow Up at the Right Time.

Track It. Follow Up at the Right Time.

Visual pipeline for every application with AI-timed follow-up reminders so nothing slips.

Track My Applications

Free · No card · 60 seconds

Similar Jobs

IT/OT Cybersecurity Assessment - Dubai, UAE

K20s - Kinetic Technologies Private Limited · Dubai

Mid-Seniorcontract

Job Role: IT/ OT Cyber security Assessment Experience: 5+ years Location: Dubai, UAE (Onsite) Duration: 1 month Mandatory: Should have Own Visa Skills Should Have Cybersecurity vulnerability assessment Network Penetratio

Skills

cybersecurityinformation securitynetwork security

2.2K+

Cover Letters & Follow-ups

1.8K+

Resumes Tailored

190.5K+

Jobs Tracked

Trusted by professionals at

PwC//
Emaar//
KPMG//
Noon//
Amazon AWS//
Talabat//
Deloitte//
Emirates//
Careem//
Aramex//
McKinsey//
Property Finder//
Majid Al Futtaim//
Chalhoub Group//
PwC//
Emaar//
KPMG//
Noon//
Amazon AWS//
Talabat//
Deloitte//
Emirates//
Careem//
Aramex//
McKinsey//
Property Finder//
Majid Al Futtaim//
Chalhoub Group//
AI Job Platform

Stop applying blindly. Start getting hired.

Base Career automates the hardest parts of job searching — apply smarter, not harder.

AI Resume in 60s

Your resume rewritten for this exact role using the job description as the brief.

ATS-Optimized

Get past automated screening filters with the right keywords matched to each job.

Application Tracker

Track every job, follow-up, and interview in one visual kanban board.

Free plan · No credit card required