Job Summary
The candidate would be responsible for identifying, evaluating, and reporting on cyber security risks, developing a set of security standards and best practices for the organization, monitoring networks and systems for security breaches and intrusions, leading technical and forensic investigations, managing the Deluxe vulnerability and penetration
- Minimum Qualification:HND
- Experience Level:Senior level
- Experience Length:5 years
Job Description/Requirements
Responsibilities:
- Responsible for preparation of IT service management performance dashboards
- Provide accurate and timely performance data in form of regular and ad-hoc requests
- Responsible for providing data analysis and reporting information relating to IT performance, process reviews, quality assurance, and customer survey
- Support the development of improvement plans as well as their implementation
- Support ISMS (information security management system) implementation
- Support and ensure compliance to ISMS policies and related procedures
- Perform vulnerability scans on a routine basis as well as for all new system installations in accordance with Vulnerability Scans and Configuration Control
- Audits logs on a routine basis for security events including intrusions, viruses, hackers, spam, security incidents and other malicious activity
- Ensures appropriate authorization and access controls are in place
- Contribute to examine impact of new technologies on the company’s information security
- Be a relevant player for education and awareness programs and advise operating units at all levels on security issues, best practices, and vulnerabilitie
Requirements:
- Minimum academic qualification of a Bachelor's degree in Computer Science, Information Technology, Management Information Systems, or a related field
- Minimum of 5 years of work experience with the development, deployment, management and automation of security solutions in enterprise (cloud and on-premise) environments
- In-depth knowledge of Linux, Unix operating systems Kali Linux experience
- Experience writing cybersecurity policies, procedures, standards and baselines
- Excellent documentation skills.
- Professional certification: Security certification of one or more of the following: CISSP, CRISC, CCSP, CISM, CISA, CEH, CCNP security.
- Knowledge of network-based, system-level, and application-layer attacks and mitigation methods
- Experience extracting pertinent security data from monitoring solutions and audit logs, and reports
- Experience in a variety of security technologies and architectures, such as MFA, VPN, DLP, SIEM, privileged access management, network security, data security, cryptography, micro-segmentation, and software-defined networks.
- Experience with enterprise security platforms and architectural design. Strong preference for candidates with proven (Cloud Computing security experience).
- Strong understanding of cyber security concepts, protocols, industry best practices, strategies, frameworks and regulations such as ISO 27001, NIST Cybersecurity Framework, Payment Card Industry Data Security Standard (PCI DSS), and Sarbanes-Oxley (SOX).
- Understanding of the Software Development Life Cycle and Development Operations (DevOps) principals
Important Safety Tips
- Do not make any payment without confirming with the Jobberman Customer Support Team.
- If you think this advert is not genuine, please report it via the Report Job link below.