The role provides expertise on monitoring security systems, detecting threats, responding to security incidents, implementing and enforcing IT security policies, procedures and technologies to protect our organization's information systems and data.
This role requires in-depth knowledge of security tools and settings, BYOD policies and enforcement, endpoint security, identity access management, Microsoft Intune, Security Operations Center (SOC) practices, and other relevant security measures.
RESPONSIBILITIES:
- Incident Response:Monitor and respond to security incidents, including malware infections, data breaches, and other security events, ensuring timely resolution.
- Security Operations Center (SOC):Work closely with vendors and partners on the SOC which involves monitoring and analyzing security events, coordinating incident response efforts, and maintaining the organization's security posture. Vulnerability
- Assessment and Remediation:Perform regular vulnerability checks and work closely with internal teams and vendors to collaborate on the findings and remediations needed.
- Policy Development and Enforcement:Develop and implement IT security policies, procedures, and guidelines to ensure the organization's systems and data are protected against threats and vulnerabilities.
- Compliance and Auditing:Ensure compliance with industry standards, regulations, and best practices.
- Risk Management:Identify potential security risks, conduct regular risk assessments, and implement measures to mitigate those risks.
- Mobile Device Management (MDM):Implement and manage MDM solutions, such as Microsoft Intune, to ensure secure access and protection of mobile devices and laptops used within the organization.
- Bring Your Own Device (BYOD) Policies:Develop and enforce BYOD policies to ensure that personal devices used by employees meet security standards and do not pose risks to the organization's network. This also includes assessing and implementing the necessary tools to enforce the policies while ensuring smooth performance of the systems.
- Cyber Security Training and Awareness:Provide training and awareness programs to employees on IT security best practices, promoting a security-conscious culture within the organization. Devise and conduct phishing campaigns and track and plan for continuous improvement of security awareness ratings of the organization and its employees.
- Threat Intelligence and Research:Stay up-to-date with the latest security threats, trends, and technologies. Conduct research and analysis to continuously improve the organization's security measures.
- Collaboration:Work closely with other departments to ensure that security measures are integrated into all business processes and systems. This includes assessing and reviewing systems and potential products before being launched in Production.
- Vendor Management:Manage relationships with security vendors and service providers to ensure the organization has access to the best security solutions and support.
QUALIFICATIONS:
Educational Background:
- Bachelor's Degree:In Information Technology, Computer Science, Cybersecurity, or any related field.
Professional Experience:
- Relevant Experience:3-5 years of professional experience in IT security roles, with a proven track record of policy development, enforcement, and incident management.
Technical Skills:
- Incident Response:Skills in monitoring and responding to security incidents and vulnerabilities.
- Security Operations Center (SOC):Familiarity with SOC practices and technologies.
- Mobile Device Management (MDM):Experience with MDM solutions such as Microsoft Intune.
- Vulnerability Management:Experience with Vulnerability Detection, Assessment and Remediations including Penetration Testing.
- Security Tools:Experience with Endpoint Protection solutions such as Trend Micro, CrowdStrike and Vulnerability Tools such as SSC, Tenable and other related tools.
- Network Security:Knowledge of network security principles and technologies.
Certifications:
- Industry Certifications:CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager). CEH (Certified Ethical Hacker), CompTIA Security+, and others are also welcome.
Soft Skills:
- Analytical Skills:Strong problem-solving and analytical abilities to identify and mitigate security risks and root causes especially in doing investigation work.
- Communication Skills:Excellent verbal and written communication skills to effectively convey security policies and procedures to all levels of the organization.
- Interpersonal Skills:Ability to collaborate and work effectively with other departments and stakeholders.
- Attention to Detail:High level of accuracy and attention to detail in managing security protocols and incidents.
Other Qualifications:
- Continuous Learning:Commitment to staying up-to-date with the latest IT security trends, threats, and technologies.
- Project Management:Strong project management skills to oversee security initiatives and ensure they are completed on time and within budget. Planning and time management are especially important especially important.
- Trustworthy and Integrity:This person must have integrity in character and know how to not to divulge sensitive information unnecessarily to others. He must also have good judgment.
- Communication:Must be able to clearly communicate with supervisors, peers, team and vendors, and able to succinctly get the point across.
Benefits:
- Company Birthday and Christmas gift
- HMO
- 10 Service Incentive Leave
- Government Mandate Benefits
- 13th Month Pay