•Serve as the recognized advisor in areas that may include incident handling, event analysis and correlation, general SIEM skills, IDS/IPS and log monitoring, Managed Security Services, and threat management
Grow and retain knowledge of business operations and unique risk factors to inform on key decisions with regard to security incident handling, including, but not limited to, when to invoke Incident Response services
Participate as a stakeholder and contributor in the decision process as to when to declare an official data breach to the public in times when such a decision point must be made
Analyze data associated to a security incident, perform deep inspection of application, log, OS, disk, network level forensic analysis for troubleshooting and researching events and alerts, discover and identify its source, purpose, intent, and if malicious or abnormal then escalate within the incident response procedures
Shape the future processes and capabilities of detecting suspicious activities
Recommend strategies to ensure continued alignment of cyber security operational functions to business strategy and to translate these requirements into specifications meaningful to senior management and stakeholders as well as engineering
Advise on how to efficiently remediate vulnerabilities, manage IT risks and improve the overall cyber security posture and resiliency of the organization
Design and create Information Security and processes (e.g., vulnerability mgmt., incident response, event monitoring, etc.)
Review and design according to substantive security controls, including corporate security policies, industry frameworks, and security frameworks
Establishment of virtual connectivity solutions for client who leverage off-shore resources during a transition effort
Performing risk assessments for projects, and providing guidance to leadership on the appropriate course of action
Subject matter expertise and guidance to project teams that request or require Information Security participation
Expected to understand and apply commonly known security practices and possess a working knowledge of applicable industry controls such as NIST 800-53. Employees will be required to maintain a working knowledge of local security policies and execute general controls as assigned.
إخلاء المسؤولية: د.جوب هو مجرد منصة تربط بين الباحثين عن عمل وأصحاب العمل. ننصح المتقدمين بإجراء بحث مستقل خاص بهم في أوراق اعتماد صاحب العمل المحتمل.
نحن نحرص على ألا يتم طلب أي مدفوعات مالية من قبل عملائنا، وبالتالي فإننا ننصح بعدم مشاركة أي معلومات شخصية أو متعلقة بالحسابات المصرفية مع أي طرف ثالث. إذا كنت تشك في وقوع أي احتيال أو سوء تصرف، فيرجى التواصل معنا من خلال تعبئة النموذج الموجود على الصفحة اتصل بنا