Role: Effectively protect organizations' digital assets and prevent security breaches by identifying threats and vulnerabilities in systems/ network/ software. Developing and implementing high-tech solutions to defend from hacking, malware and ransomware, insider threats, and all types of cybercrime.
Protect organizations' digital assets and prevent security breaches by identifying threats and vulnerabilities in systems/ network/ software.
Developing and implementing high-tech solutions to defend from hacking, malware and ransomware, insider threats and all types of cybercrime.
Continuously assess, test, improve and document Security activities and create reports highlighting the IT security issues, gaps, concerns, criticalities and co-ordinate security incidents with the Team, Subject Matter Experts (SMEs) and Security Leader.
Safeguard organization Informations as per Information Security Management System (ISMS) protocols.
Implement and maintain the Information Security Management System and policies, standards, procedures and guidelines.
Perform IT compliance monitoring and improvement activities to ensure compliance both with internal security policies etc. and applicable laws and regulations.
Conduct information security awareness campaigns.
Participate and support information security risk assessments and control selection activities and information security audit activities.
Participate and support contingency planning, business continuity management and IT disaster recovery in conjunction with relevant functions and third parties.
Asses the network, system with the vulnerability scanner and highlight the vulnerability and conduct the risk assessment.
Consult with the next generation solution to up to date with the IT standard and compliance
Experience in the ISO 27001 compliance requirement and must have Experience in auditing of organization network
Experience in the SIEM, SOAR, EDR, Firewall, Network Security, MFA, Exchange, Data Security, Web Security
Comply with IT Policies (Governance and IT Security) and all applicable system and security controls, clauses and laws.
Report any Information Security incidents in a timely manner and action them as per management directions.
Desired Candidate Profile
Bsc. Computer, Bachelor of Technology/Engineering(Computers, Other Engineering)
Cisco certification (CCNA, CCNP, CCDA)/ Microsoft Certification (MCSA, MCSE), CEH Good to have Regulatory Compliance auditing knowledge, CISSP, Linux OS Knowledge, OSCP, OSCE, Database Knowledge