- Organize computer security architecture and develop detailed cyber security designs
- Review develop and implement security measures for the protection of computer systems networks and information
- Define system security requirements and prepare reports on your results
- Review and document standard operating procedures and protocols
- Configure and troubleshoot security infrastructure devices
- Create technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks
- Perform support and consulting of the company's personnel about security incidents and measures
- Prepare detailed reports including assessment-based findings outcomes and propositions for further system security enhancement.
Qualifications :
- Bachelor of Science in Computer Science or a related field
- Five or more years work experience as a System Security Engineer or related position
- Proven experience developing, operating and maintaining security systems
- Extensive knowledge of operating system and database security
- Proficiency in networking technologies, network security and network monitoring solutions
- Knowledge of security systems including anti-virus applications, content filtering, firewalls, authentication systems and intrusion detection and notification systems
- In-depth knowledge of database and operating system security, security protocols and principles
- Good experience with network security and networking technologies and with system security and network monitoring tools
- Good familiarity of the latest security principles techniques and protocols
- Understanding of Web related technologies including applications services Service Oriented Architectures networking protocols and so on
- Good experience in security systems including firewalls intrusion detection systems anti-virus software authentication systems log management content filtering etc
- Critical thinking skills and ability to solve complex problems
- Prepare detailed reports including assessment-based findings outcomes and propositions for further system security enhancement