Job Description
Purpose of Job:
- Responsible for providing security for an organization’s overall IT systems.
- They search for vulnerabilities in software, hardware, networks, and data centers and design strategies and defensive systems to protect against attacks and threats
REPORTING RELATIONSHIPS:
- Reports To: Head, Internal Control and Compliance
RESPONSIBILITIES
- Conduct threat and risk analysis and analyze the business impact of new and existing systems and technologies to eliminate risk, performance, and capacity issues.
- Implement vulnerability assessments and configure audits of operating systems, web servers, and databases and detect patterns, insecure features, and malicious activities in the infrastructure.
- Perform research, testing, evaluation, and deployment of security technology and procedures.
- Run diagnostics on any changes to data to verify any undetected breaches.
- Develop custom systems for specialized security features and procedures for software systems, networks, data centers, and hardware.
- Develop and implement information security standards, guidelines, and procedures.
- Develop firewalls to secure the network infrastructure.
- Keep current with new intrusion methods and develop protection plan and having an in-depth understanding of vulnerabilities, management systems, and common security applications.
- Conduct counteractive protocols and report incidents by offering customized risk ratings for vulnerabilities based on company policies and maintain IT security controls documentation.
- Grant permissions and privileges to authorized users.
- Configure anti-virus systems and consoles and conduct software upgrades.
- Have an in-depth understanding of OWASP testing methodology, Dynamic and Static Application Security Testing, re-engineering, automation, ASP.NET/JAVA, IDS/IPS systems, Burp Suite, Nmap, Nessus, Qualys, and Metasploit, etc.
Requirements
KEY SKILLS & COMPETENCIES REQUIREMENTS:
- Proven work experience as a Cyber Security Specialist or similar role
- Hands-on experience analyzing high volumes of logs, network data and other attack artifacts
- Experience with vulnerability scanning solutions
- Proficiency with antivirus and security software
- Bachelor’s degree in Computer Science, Information Systems, or equivalent education or work experience
- Working knowledge of a wide range of datacenter technologies including: Local (LAN) and wide-area networks (WAN); NAS and/or SAN storage technologies. Firewalls, and VPN Network protocols such as TCP/IP, DHCP, DNS, SNMP, FTP, HTTP, SMTP, etc.