Develop and design security architectures for complex systems. Implement security solutions that effectively protect information systems and data.
2. Implementation of Security Measures:
Deploy security technologies, including firewalls, intrusion detection/prevention systems, antivirus software, and encryption solutions. Configure and manage security tools to detect and respond to security incidents.
3. Network Security:
Implement and manage network security measures to protect against unauthorized access, attacks, and vulnerabilities.
4. Vulnerability Management:
Conduct vulnerability assessments and penetration testing to identify and remediate security weaknesses. Develop and implement strategies for addressing vulnerabilities in a timely manner.
5. Identity and Access Management:
Design and implement access controls to ensure only authorized users have appropriate access. Manage identity and access management solutions to protect against unauthorized access.
6. Security Policy and Compliance:
Develop and enforce security policies, standards, and procedures. Ensure compliance with relevant laws, regulations, and industry standards.
7. Incident Response and Forensics:
Participate in incident response activities, including investigation, analysis, and resolution of security incidents. Conduct digital forensics to identify the root cause of security incidents.
8. Security Awareness and Training:
Provide security awareness training to employees to promote a security-conscious culture. Advise on best practices for maintaining security in daily operations.
9. Security Research and Evaluation:
Stay informed about the latest security trends, threats, and technologies. Evaluate new security solutions and technologies for potential adoption.
10. Collaboration and Communication:
Collaborate with other IT teams, departments, and stakeholders to implement security measures. Communicate security risks and recommendations to technical and non-technical audiences.
11. Impact study of various alerts and categorization based on priority.
12. Strong experience in managing Cyber Security within IT Application, Cloud, Network, IT Infrastructure, etc.
13. Having an active role in all aspects of the project - from first meeting with clients and identifying the Security issues to final recommendations and implementation of the Security change.
14. Good experience in troubleshooting and resolving issues related to Firewall, Cyber security Attack, Threat Management and etc
15. Good understanding of the current IT Security practices, threat analysis, privacy and risk policies especially covering Data Loss Prevention (DLP) and etc.
16. Consistently develop security procedures and standard operating documents related to IT Security Operations covering configuration, patching, troubleshooting guides etc.
17. Ability to handle high pressure situations with Good Analytical skills, Problem solving and Interpersonal skills.
18. Find cost-effective solutions to cyber security problems