Company Description
ZySec AI is advancing the development of the Sovereign Intelligence Stack—an AI infrastructure that provides organizations with complete ownership and control. Our mission is to empower mission-critical organizations to implement AI solutions while maintaining stringent data ownership, compliance, and security. With a focus on systems that are private by design and resilient by architecture, ZySec AI ensures no trade-offs between capability and data control. Our flagship platform, CyberPod, is an Autonomous Data Intelligence Platform that delivers real-time, context-aware insights with zero data exposure. At the forefront of the global movement for sovereign intelligence, our vision is to make intelligence trusted and owned by design. Join us to help shape the future of AI-driven capabilities.
Role Description
We are seeking a skilled and motivated Security Consultant for a full-time, on-site role based in Abu Dhabi. The Security Consultant will be responsible for assessing, designing, and implementing security strategies to secure applications, networks, and information systems. Responsibilities include conducting risk assessments, developing security architecture, ensuring compliance with industry standards, and collaborating with clients to mitigate vulnerabilities. The role also involves providing expert insights to enable organizations to enhance their cybersecurity measures and maintain robust defenses.
Qualifications
- Proficiency in Security Consulting to design, implement, and evaluate effective security strategies
- Knowledge of Application Security principles and experience in securing software systems
- Experience in Cybersecurity, including threat analysis and prevention measures
- Expertise in Network Security and securing communication systems and hardware
- Skills in Information Security to safeguard sensitive data and ensure compliance
- Strong interpersonal and communication skills to collaborate effectively with clients and teams
- Ability to work in fast-paced, mission-critical environments
- Relevant industry certifications (e.g., CISSP, CEH, or CISM) are advantageous
- Bachelor’s degree in Cybersecurity, Information Technology, or related fields