Developing and maintaining security policies and procedures: This involves creating guidelines for secure usage of university IT resources, including password management, data handling, and acceptable use policies.
Implementing and managing security controls: This includes setting up firewalls, intrusion detection systems, and anti-virus software to protect the university network from unauthorized access and malicious attacks.
Monitoring and analyzing network activity: Monitor network traffic for suspicious activity and potential breaches. Analyze logs and identify vulnerabilities to address them proactively.
Responding to security incidents: Containing the damage, investigating the incident, and implementing recovery measures in case of a security breach.
Educating and training faculty, staff, and students: Raising awareness about cybersecurity best practices is crucial. Conduct training sessions, workshops, and campaigns to educate users on various security topics like phishing scams and social engineering.
Staying current with evolving threats: The cybersecurity landscape is constantly changing. IT security specialists need to stay updated on the latest threats, vulnerabilities, and mitigation strategies.
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.