• Services

    We mainly focus on Banking, Management Resources, IT, Telecom, Aviation, eGovernment offerings.

     
  • Solutions

    We are offering various solution for business. Such as IT, E-commerce, HR and Management solutions.

     
  • Projects

    We undertake a wide range of projects. Related with Banking and service industry, IT Projects etc..

     

Newsletter:



VAM Systems

Looking for custom Mobile, Cloud, Security, Big Data, Database, IT Staff Augmentation or Digital Marketing solutions & services? Look no further... You have arrived at the right Destination.
Cloud Computing is poised to redefine and take over the IT world and change the way companies around the world do business. Cloud computing has the potential to become the defining technology of this Century !
We are domain experts in building Mobile applications, Cloud Computing solutions, Big Data Solutions, Databases & also provide IT Staff Augmentation & Digital Marketing services.
We provide cutting-edge technology to execute your ideas and turn them into reality. VAM Systems focuses on making any business application run successfully. In tune with the spirit of innovation and creativity, we believe in thinking beyond the convention i.e., Out of the Box.
VAM Systems's corporate objective is to assist its clients to focus on respective core competence to remain competent and profitable organizations.


Hot Jobs


  • Chief of Security Monitoring 30 Nov
    We are currently looking for Chief of Security Monitoring for our Bahrain operations with the following skill set and terms and conditions:

    Skillsets Required

    • Experience in security monitoring and incident response; preferably within a professional services firm or similar environment 
    • Strong understanding of network, computer and server technologies, including experience with network intrusion methods, network containment, and segregation techniques and technologies
    • Must be familiar with standard security concepts, practices and procedures
    • Experience with information security best practices
    • Leadership & well-developed people management skills – ability to motivate and develop subordinates and peers and promote teamwork
    • Excellent planning and organizational skills
    • Excellent communication and presentation skills – written and verbal
    • Good interpersonal skills
    • Ability to operate effectively at all levels within the business
    • Ability to handle multiple activities simultaneously and operate effectively under pressure
    • Good English & Arabic language skills – written and spoken

    Qualifications

    The Chief of Security Monitoring should be a graduate of computer science and must have 7 to 12 years of relevant experience.

    In addition, must possess all of the following certifications:

    • GSEC: GIAC Security Essentials
    • GCIH: GIAC Certified Incident Handler
    • GCIA: GIAC Certified Intrusion Analyst
    • GMON: GIAC Continuous Monitoring Certification
    • GNFA: GIAC Network Forensic Analyst

    In addition, must possess one or more of the following certifications:

    • CISSP
    • CISM
    • PMP

    Responsibilities

    Leadership and people management

    • Provide direction and guidance to officers in their assigned job duties.
    • Organize, direct and control the activities of the section to ensure and maintain consistent support and delivery of services within defined Operational and Service Level Agreement standards.
    • Monitor and analyze training needs for the section and ensure the provision of appropriate training interventions so that employees at all levels have the required skills and knowledge to deliver organizational objectives.

    Service delivery and technical standards

    • Accountable to design and utilize dashboards or platform specific consoles, repositories, and/or third-party security services associated with security processes and tools to represent threats and vulnerabilities in the environment
    • Accountable to manage security tools and security monitoring of systems that are operated by the IT organization while expanding the usage of security monitoring tools
    • Accountable to define the configuration parameters for monitoring tools; including alerts, correlation rules, and reporting
    • Accountable to function as the technical lead for security monitoring and incident response
    • Accountable to act as a knowledge resource regarding security monitoring tools and incident response strategies
    • Accountable to create and maintain technical documentation for security tools, perform system health checks, create test cases and lead the upgrade of security tools
    • Assist in identifying opportunities for improvement, such as improvements in security controls and lead the design and implementation of related improvements
    • Accountable to manage the product roadmaps for the security tools and stay abreast of the latest information security controls, practices, techniques and capabilities in the marketplace
    • Accountable to identify old and new security incidents and coordinate response to security incidents.
    • Accountable to implement and maintain continuous security monitoring operational model.
    • Accountable to proactively identify and analyze complex internal and external threats, including viruses, Trojan horses, targeted attacks, unauthorized access, and Advanced Persistent Threats (APT)

    Purpose of the position

    • Managing and monitoring of the network and systems
    • Managing the various SIEM, scanning tools, assessing and analyzing the data collected from those tools, as well as tracking and reporting on suspicious activity.

    Terms and conditions:

    Joining time frame:  1 month 

    The selected candidates shall join VAM Systems - Bahrain and shall be deputed to one of the leading Government Organizations in Bahrain.

    Should you be interested in this opportunity, please send your latest resume in MS Word format at the earliest at joinus@vamsystems.com  or call us +91 471 3073535 or +91 476 2681150.

  • Chief of Cyber Defense 30 Nov
    We are currently looking for Chief of Cyber Defense for our Bahrain operations with the following skill set and terms and conditions:

    Skillsets Required

    • Strong web application penetration testing experience
    • Experience in vulnerability identification and remediation
    • Knowledge of the software development lifecycle
    • Experience with performing code review, wireless and firewall assessments 
    • Solid network penetration testing experience
    • Programming background (C++, Perl, Python, Shell) for tool and exploit development is a plus
    • Technical knowledge in network security products, cryptographic suites and network/application firewalls is a plus
    • Experience with mobile application and operating system testing
    • Knowledge of security standards including Windows and Linux operating systems, network, firewall, wireless, end user acceptable use (e.g. web filtering) and public key infrastructure. 
    • Solid knowledge of information security principles and practices with demonstrated experience in and deploying security tools and techniques is required.
    • Knowledge of regulatory frameworks desired (e.g. PCI, SOX, SSAE16, ISO 27001). 
    • Expertise in intrusion detection and prevention, content filtering, security incident and event management (SIEM), compliance monitoring, and vulnerability and application scanning including Web vulnerability scanning and reporting, endpoint security and encryption services including secure mail systems. 
    • Expertise in security testing tools, suites, and processes such as: OWASP, Metasploit, nmap, Fiddler, Burp Suite, RSA, APT Technologies, Nessus, Snort, Wireshark, etc.
    • Leadership and well-developed people management skills – ability to motivate and develop subordinates and peers and promote teamwork
    • Excellent planning and organizational skills
    • Excellent communication and presentation skills – written and verbal
    • Good interpersonal skills
    • Ability to operate effectively at all levels within the business
    • Ability to handle multiple activities simultaneously and operate effectively under pressure
    • Good English & Arabic language skills – written and spoken

    Qualifications

    The Chief of Cyber Defense should be a graduate of computer science or a closely related field and must have 7 to 12 years of relevant experience and must possess one or more of the following certifications:

    • Certified Information Systems Security Professional (CISSP), 
    • Certified Information Security Manager (CISM) 
    • Masters in Information Security

    The Chief must also hold four or more of the following technical certifications:-

    • GIAC Penetration Tester (GPEN) 
    • GIAC Web Application Penetration Tester (GWAPT)
    • GIAC Python Coder (GPYC)
    • GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
    • Offensive Security Certified Professional (OSCP)
    • Offensive Security Certified Expert (OSCE)
    • Offensive Security Web Expert (OSWE)
    • Offensive Security Exploitation Expert (OSEE)

    Responsibilities

    Leadership and people management

    • Provide direction and guidance to officers in their assigned job duties.
    • Organize, direct and control the activities of the section in scope to ensure and maintain consistent support and delivery of services within agreed Operational and Service Level Agreement standards.
    • Monitor and analyze training needs for the teams in scope and ensure the provision of appropriate training interventions so that employees at all levels have the required skills and knowledge to deliver organizational objectives.

    Service delivery and technical standards

    • Accountable to conduct periodic vulnerability assessments and penetration tests on systems, networks and applications
    • Accountable for protection of government assets through the operation and maintenance of all penetration testing equipment
    • Accountable to investigate suspicious security event activity 
    • Accountable to review and modify the security systems’ rules and filters to better detect and prevent security incidents 
    • Accountable to coordinate with the Emergency Response Directorate during security incidents
    • Participate in escalated security incidents via post incident review meetings 
    • Deliver presentations to users 
    • Stay abreast of new tools, technologies, and techniques, and implement them as solutions to business and technical problems 
    • Provisioning of best practice advice and guidance in the areas of cyber defense;
    • Provisioning of best practice advice and guidance in the areas of intrusion detection and prevention, network and host security, advanced persistent threat (APT), data center and cloud computing security

    Purpose of the position

    • Identify and mitigate security vulnerabilities in specified systems, networks, and applications

    Terms and conditions:

    Joining time frame:  1 month 

    The selected candidates shall join VAM Systems - Bahrain and shall be deputed to one of the leading Government Organizations in Bahrain.

    Should you be interested in this opportunity, please send your latest resume in MS Word format at the earliest at joinus@vamsystems.com  or call us +91 471 3073535 or +91 476 2681150.

  • Senior Officer of Security Monitoring 30 Nov
    We are currently looking for Senior Officer of Security Monitoring for our Bahrain operations with the following skill set and terms and conditions:

    Skillsets Required

    • Experience in security monitoring and incident response; preferably within a professional services firm or similar environment 
    • Strong understanding of network, desktop and server technologies, including experience with network intrusion methods, network containment, and segregation techniques and technologies.
    • Must be familiar with standard security concepts, practices and procedures
    • Experience with information security best practices
    • Analytical and problem-solving skills
    • Good communication and English language skills – written and verbal
    • Ability to handle multiple activities
    • Ability to work both independently, with minimal supervision, and as part of a team

    Qualifications

    The Security Monitoring Officer should be graduate of computer science and must have at least 4 years of relevant experience.
    In addition, must possess the GSEC certification and three or more of the following certifications:

    • GCIH: GIAC Certified Incident Handler
    • GCIA: GIAC Certified Intrusion Analyst
    • GMON: GIAC Continuous Monitoring Certification
    • GNFA: GIAC Network Forensic Analyst

    Responsibilities

    • Responsible to lead in designing and utilizing dashboards or platform specific consoles, repositories, and/or third-party security services associated with security processes and tools to represent threats and vulnerabilities in the environment
    • Responsible to manage security tools and security monitoring of systems that are operated by the IT organization while expanding the usage of security monitoring tools
    • Responsible to support configuration parameters for monitoring tools; including alerts, correlation rules, and reporting
    • Responsible to serve as the technical lead for security monitoring and incident response
    • Responsible to act as a knowledge resource regarding security monitoring tools and incident response strategies
    • Responsible to supervise the maintenance of technical documentation for security tools, perform system health checks, create test cases and lead the upgrade of security tools
    • Lead in identifying opportunities for improvement, such as improvements in security controls and lead the design and implementation of related improvements
    • Responsible to support and update the product roadmaps for the security tools and stay abreast of the latest information security controls, practices, techniques and capabilities in the marketplace
    • Responsible to identify old and new security incidents and coordinate response to security incidents.
    • Responsible to follow the defined continuous security monitoring operational model.
    • Responsible to proactively identify and analyze complex internal and external threats, including viruses, Trojan horses, targeted attacks, unauthorized access, and Advanced Persistent Threats (APT).

    Purpose of this Position

    • Lead in monitoring of the network and systems
    • Supporting SIEM, scanning tools, assessing and analyzing the data collected from those tools, as well as tracking and reporting on suspicious activity.

    Terms and conditions:

    Joining time frame:  1 month 

    The selected candidates shall join VAM Systems - Bahrain and shall be deputed to one of the leading Government Organizations in Bahrain.

    Should you be interested in this opportunity, please send your latest resume in MS Word format at the earliest at joinus@vamsystems.com  or call us +91 471 3073535 or +91 476 2681150.

  • Senior Officer Cyber Defense 30 Nov
    We are currently looking for Senior Officer Cyber Defense for our Bahrain operations with the following skill set and terms and conditions:

    Skillsets Required

    • Strong web application penetration testing experience
    • Experience in vulnerability identification and remediation
    • Knowledge of the software development lifecycle
    • Experience with performing code review, wireless and firewall assessments 
    • Solid network penetration testing experience
    • Programming background (C++, Perl, Python, Shell) for tool and exploit development is a plus
    • Technical knowledge in network security products, cryptographic suites and network/application firewalls is a plus
    • Experience with mobile application and operating system testing
    • Experience in evasion techniques to bypass firewalls, and intrusion detection, is a plus 
    • Knowledge of security standards including Windows and Linux operating systems, network, firewall, wireless, end user acceptable use (e.g. web filtering) and public key infrastructure. 
    • Solid knowledge of information security principles and practices with demonstrated experience in and deploying security tools and techniques is required.  Knowledge of regulatory frameworks desired (e.g. PCI, SOX, SSAE16, ISO 27001). 
    • Expertise in intrusion detection and prevention, content filtering, security incident and event management (SIEM), compliance monitoring, and vulnerability and application scanning including Web vulnerability scanning and reporting, endpoint security and encryption services including secure mail systems. 
    • Expertise in security testing tools, suites, and processes such as: Metasploit, nmap, Fiddler, Burp Suite, OWASP, RSA, APT Technologies, Nessus, Snort, Wireshark, etc…
    • Analytical and problem solving skills
    • Good communication and English language skills – written and verbal
    • Ability to handle multiple activities
    • Ability to work both independently, with minimal supervision, and as part of a team

    Qualifications

    The Cyber Defense Officer should be a diploma holder/graduate of computer science and must have 4 to 7 years of relevant experience and must possess 3 or more of the following certifications:

    • GIAC Penetration Tester (GPEN) 
    • GIAC Web Application Penetration Tester (GWAPT)
    • GIAC Python Coder (GPYC)
    • GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
    • Offensive Security Certified Professional (OSCP)
    • Offensive Security Certified Expert (OSCE)
    • Offensive Security Web Expert (OSWE)
    • Offensive Security Exploitation Expert (OSEE)

    Responsibilities

    • Responsible to lead in conducting periodic vulnerability assessments and penetration tests on system, networks and applications
    • Responsible for protection of government assets through the operation and maintenance of all penetration testing equipment;
    • Research new and emerging threats to gain insight and understanding of the evolving threat landscape 
    • Responsible to lead in the investigation of suspicious security event activity 
    • Responsible to lead in reviewing and modifying the security systems’ rules and filters to better detect and prevent security incidents 
    • Responsible to coordinate with the Emergency Response Directorate during security incidents
    • Participate in escalated security incidents via post incident review meetings 
    • Deliver presentations to users and management on information security issues 
    • Stays abreast of new tools, technologies, and techniques, and implements them as solutions to business and technical problems 
    • Provisioning of best practice advice and guidance in the areas of cyber defense;
    • Provisioning of best practice advice and guidance in the areas of intrusion detection and prevention, network and host security, advanced persistent threat (APT) data center and cloud computing security

    Purpose of the position

    • Identify and mitigate security vulnerabilities in specified systems, networks, and applications

    Terms and conditions:

    Joining time frame:  1 month 

    The selected candidates shall join VAM Systems - Bahrain and shall be deputed to one of the leading Government Organizations in Bahrain.

    Should you be interested in this opportunity, please send your latest resume in MS Word format at the earliest at joinus@vamsystems.com  or call us +91 471 3073535 or +91 476 2681150.

  • Officer of Security Monitoring 30 Nov
    We are currently looking for Officer of Security Monitoring for our Bahrain operations with the following skill set and terms and conditions:

    Skillsets Required

    • Experience in security monitoring and incident response; preferably within a professional services firm or similar environment 
    • Strong understanding of network, desktop and server technologies, including experience with network intrusion methods, network containment, and segregation techniques and technologies.
    • Must be familiar with standard security concepts, practices and procedures
    • Experience with information security best practices
    • Analytical and problem-solving skills
    • Good communication and English language skills – written and verbal
    • Ability to handle multiple activities
    • Ability to work both independently, with minimal supervision, and as part of a team

    Qualifications

    The Security Monitoring Officer should be graduate of computer science and must have at least 1 year of relevant experience.
    In addition, must possess one or more of the following certifications:

    • CCNA Security
    • GSEC: GIAC Security Essentials

    Responsibilities

    • Responsible to assist in designing and utilizing dashboards or platform specific consoles, repositories, and/or third-party security services associated with security processes and tools to represent threats and vulnerabilities in the environment
    • Responsible to manage security tools and security monitoring of systems that are operated by the IT organization while expanding the usage of security monitoring tools
    • Responsible to support configuration parameters for monitoring tools; including alerts, correlation rules, and reporting
    • Responsible to serve as the technical lead for security monitoring and incident response
    • Responsible to act as a knowledge resource regarding security monitoring tools and incident response strategies
    • Responsible to maintain technical documentation for security tools, perform system health checks, create test cases and lead the upgrade of security tools
    • Assist in identifying opportunities for improvement, such as improvements in security controls and lead the design and implementation of related improvements
    • Responsible to support and update the product roadmaps for the security tools and stay abreast of the latest information security controls, practices, techniques and capabilities in the marketplace
    • Responsible to identify old and new security incidents and coordinate response to security incidents.
    • Responsible to follow the defined continuous security monitoring operational model.
    • Responsible to proactively identify and analyze complex internal and external threats, including viruses, Trojan horses, targeted attacks, unauthorized access, and Advanced Persistent Threats (APT).

    Purpose of this Position

    • Assist in monitoring of the network and systems
    • Supporting SIEM, scanning tools, assessing and analyzing the data collected from those tools, as well as tracking and reporting on suspicious activity.

    Terms and conditions:

    Joining time frame:  1 month 

    The selected candidates shall join VAM Systems - Bahrain and shall be deputed to one of the leading Government Organizations in Bahrain.

    Should you be interested in this opportunity, please send your latest resume in MS Word format at the earliest at joinus@vamsystems.com  or call us +91 471 3073535 or +91 476 2681150.

  • Officer Cyber Defense 30 Nov
    We are currently looking for Officer Cyber Defense for our Bahrain operations with the following skill set and terms and conditions:

    Skillsets Required

    • Strong web application penetration testing experience
    • Experience in vulnerability identification and remediation
    • Knowledge of the software development lifecycle
    • Experience with performing code review, wireless and firewall assessments 
    • Solid network penetration testing experience
    • Programming background (C++, Perl, Python, Shell) for tool and exploit development is a plus
    • Technical knowledge in network security products, cryptographic suites and network/application firewalls is a plus
    • Experience with mobile application and operating system testing
    • Experience in evasion techniques to bypass firewalls, and intrusion detection, is a plus 
    • Knowledge of security standards including Windows and Linux operating systems, network, firewall, wireless, end user acceptable use (e.g. web filtering) and public key infrastructure. 
    • Solid knowledge of information security principles and practices with demonstrated experience in and deploying security tools and techniques is required.  Knowledge of regulatory frameworks desired (e.g. PCI, SOX, SSAE16, ISO 27001). 
    • Expertise in intrusion detection and prevention, content filtering, security incident and event management (SIEM), compliance monitoring, and vulnerability and application scanning including Web vulnerability scanning and reporting, endpoint security and encryption services including secure mail systems. 
    • Expertise in security testing tools, suites, and processes such as: Metasploit, nmap, Fiddler, Burp Suite, OWASP, RSA, APT Technologies, Nessus, Snort, Wireshark, etc…
    • Analytical and problem solving skills
    • Good communication and English language skills – written and verbal
    • Ability to handle multiple activities
    • Ability to work both independently, with minimal supervision, and as part of a team

    Qualifications

    • The Cyber Defense Officer should be a diploma holder/graduate of computer science and must have 2 to 7 years of relevant experience and must possess one or more of the following certifications:
    • GIAC Penetration Tester (GPEN) 
    • Offensive Security Certified Professional (OSCP)

    Responsibilities

    • Responsible to assist and conduct periodic vulnerability assessments and penetration tests on system, networks and applications
    • Responsible for protection of government assets through the operation and maintenance of all penetration testing equipment;
    • Research new and emerging threats to gain insight and understanding of the evolving threat landscape 
    • Responsible to assist in the investigation of suspicious security event activity 
    • Responsible to assist in reviewing and modifying the security systems’ rules and filters to better detect and prevent security incidents 
    • Responsible to  coordinate with the Emergency Response Directorate during security incidents
    • Participate in escalated security incidents via post incident review meetings 
    • Deliver presentations to users and management on information security issues 
    • Stays abreast of new tools, technologies, and techniques, and implements them as solutions to business and technical problems 
    • Provisioning of best practice advice and guidance in the areas of cyber defense;
    • Provisioning of best practice advice and guidance in the areas of intrusion detection and prevention, network and host security, advanced persistent threat (APT) data center and cloud computing security

    Purpose of the position

    • Identify and mitigate security vulnerabilities in specified systems, networks, and applications

    Terms and conditions:

    Joining time frame:  1 month 

    The selected candidates shall join VAM Systems - Bahrain and shall be deputed to one of the leading Government Organizations in Bahrain.

    Should you be interested in this opportunity, please send your latest resume in MS Word format at the earliest at joinus@vamsystems.com  or call us +91 471 3073535 or +91 476 2681150.

  • View More