HamburgerMenu
hirist

Job Description

Roles & Responsibilities :


- Leverage the existing cybersecurity tools and capable to identify open-source tools to discover threat agent actions.

- Identify potential threats and mitigation strategies to enable a proactive defense mechanism before an actual security incident.

- Design and implement a security incident response process.

- Act as the primary control point during significant information security incidents, manage the development of incident response plans and generate detailed reports.

- Identify and propose the implementation of the key information security initiatives, plans, practices and tools to the management.

- Proactive support on the approved information security projects, internal/external security audits, internal audits, application security assessment and reviews and compliance.

- Identify and understand potential and emerging information security threats and vulnerabilities and implement an effective communication channel across the appropriate teams.

- Detect and respond to cyber security threats and implement remediation controls.

- Perform GRC assessment on IT infrastructure and Applications and prepare plan to mitigate.

- Hardening reviews of endpoints, networks and servers.

- Manage security compliance for end points, networks, servers, databases, etc.

- Proficient in operating cyber security solutions to protect IT Infrastructure and data it hold.


What we are looking for :


- Bachelors degree specializing in Information Security, Computer Science, Information Management Systems, or relevant work experience.

- Minimum 6 years of experience in Cyber Security.

- Individual Contributor and capable of working independently.

- Strong technical skills relevant to Information Security such as SIEM, IDAM, PIM/PAM, Breach Attack Simulation and Micro segmentation.

- An excellent knowledge and deep understanding of the complex network and end point security principles and concepts.

- Practical knowledge of operating systems (such as : Windows, Linux, Hypervisors).

- Detailed experience with vulnerability scanning solutions.

- Ability to identify and mitigate network vulnerabilities and an understanding of their remediation.

- Required to assist with root cause identification for incident management.

- Should be acquainted with Information Security Industry standards/best practices and relevant regulations (such as : SSAE16, SOC 2, PCI DSS, HIPAA, GLBA, FISMA, NIST, ISO27000, CobiT, ISF, OWASP, SANS).

- Must have proficient analytical, technical research and detail-oriented skills.

- Available to work on-call whenever required.


Employment Type : Full-Time.


info-icon

Did you find something suspicious?