I. Job Summary
The Cyber Security Administrator role is to perform the identification, investigation and resolution of security breaches detected by the in-placed security solutions and in Cloud applications.
The Cyber Security Administrator is involved in the evaluation and implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines and procedures as well as conducting vulnerability audits and assessments including administration and management on the various complete security requirements for Cloud.
II. Duties and Responsibilities
- Participate in the planning and design of enterprise security architecture, under the direction of the Security Administration Section Head, where appropriate.
- Participate in the creation and maintenance of IT security documents (policies, standards, baselines, guidelines and procedures) under the direction of the Security Administration Section Head, where appropriate.
- Participate in the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Plan, under the direction of the Security Administration Section Head, where appropriate.
- Ensure compliance with information security policies and procedures and other recommended security requirements from both internal and external auditors.
- Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.
- Perform deployment, integration and initial configuration of all new security solutions.
- Perform enhancements to existing security solutions in accordance with standard best operating procedures generically and also specific to enterprise's security documents.
- Maintain and monitor operational configuration of all in-placed security solutions per established baselines.
- Participate in the design, execution and investigation on related security issue and of vulnerability assessments, penetration tests and security audits.
- Handle service request and provide on-call support for end users for all in-place security solutions. Such as
o Granting of Internet access
o Granting access of USB ports
o Firewall change request
o Unblocking of website
o Blocking of spam email
o Deletion of separated employees from the system security solutions.
- Generates monthly security reports.
- Provides regulatory performance and status reports.
- Operation support for related end-users.
- Supports cost-cutting initiatives, programs and directives of the department, division and the Bank.
- Collaborates with Risk on implementation of various cloud security solutions/applications.
- Addresses process improvement in the management and administration of critical security appliance and device.
- Performs as backup for key SecAd Officers of the department.