- Excellent knowledge and experience with information security frameworks and concepts, trends and practices is essential.
- Detailed knowledge of firewalls, vulnerability management platforms, End Point Protection technologies, VLANs and custom routing is essential.
- Sound understanding of targeted cyber-attack (APT), how to analysis these and respond to and mitigate against the attacks is essential.
- Sound knowledge of project delivery phases
- Should knowledge of preparing and describing security requirements for projects
- Intermediate knowledge of working within Risk management frameworks such as RCSA is desirable.
- Intermediate knowledge of and experience of using tools for security monitoring (e.g. Rapid7, Websense, Splunk, QRadar, Intel MacAfee, ArcSight, RSA NetWitness), is essential.
- Intermediate cloud security knowledge is essential.
- Excellent knowledge of Networking TCPIP protocols is essential.
- Intermediate knowledge of IT Infrastructure (Microsoft and Linux) is essential.
- Intermediate Knowledge of Windows Active Directory environments, domain trust, federated authentication, design and implementation is desirable.
- Intermediate knowledge of Information Security standards like ISO 27001 Cyber Essentials is essential.
- Basic knowledge of and exposure dealing with external and internal auditors is desirable.
- Analytical Skills and Strong Cyber Security knowledge is a key for this role
- Good Judgemental, Problem Solving and Good Investigation Skills.
- Knowledge on Access management best practices
- Up to date with emerging threats and technology that are in use to prevent exploitation and attack.
- Knowledge on Ethical Hacking tools and the knowledge on how the tools are used by threat actors.
- Basic idea on Policy and Policy defining based on the infrastructure.
- Creating custom alerts or rules on multiple security tools
- Creating appropriate dashboards for the team to monitor with ease based on the environment on demand.