Min menu

Pages














Responsible for the security role of Diplomat which ensures that the compromise and security level of the systems is ensured. They are security experts who work in accordance with government information security regulations and security laws. Their work involves solving information security issues in the company, assessing security risks, strictly implementing security principles and operating secure systems.

Certified information security manager (cism) requirements:

CISM stands for Certified Information Security Manager, a security certification that assures that the work is being done at a professional level in accordance with global standards regarding information management to protect capital. CISM is suitable for managers, administrators, or experienced professionals who work in security organizations.

The following requirements must be met to obtain CISM certification:

  1. Five years of satisfactory experience is required.
  2. Two years of CISM academic professional experience is required.
  3. Five co-interested professional references are required during the five Ramadan period.
  4. A previous or current security certification is encouraged.
  5. CISM exam is essential for success.
  6. These terms are for guidance only. To get more details on CISM certification, contact the experts in this regard.
Information Security Manager job timetable:
Morning: 
Review and respond to emails and messages, prioritize tasks for the day, and attend any scheduled meetings or calls.



Mid-morning:
 Review security systems, including firewalls, intrusion detection systems, and antivirus software, to ensure they are up-to-date and working properly.

Afternoon: 

Conduct vulnerability assessments and penetration testing to identify and remediate any security vulnerabilities in the organization's systems and networks.

Late afternoon: 

Meet with team members to discuss ongoing projects, address any issues or concerns, and plan for future projects.

Syria:

Review reports and documents related to security incidents, potential threats, and ongoing security projects.

Late evening: 

Update security policies and procedures to reflect changes in technology or new threats and risks.

Weekends:

Stay up-to-date on new threats and vulnerabilities by attending conferences, reading industry publications, and participating in online forums and communities. Overall, the job of an information security manager is demanding and requires a high level of technical skills, critical thinking, and attention to detail. They must also stay abreast of the latest security threats and best practices for protecting their organization's systems and data.

Comments