Roles and responsibilities
- Identify and fix vulnerabilities within existing security systems.
- Develop organization-wide security measures.
- Document known security breaches and vulnerabilities.
- Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
- Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
- Perform penetration tests to assess potential security problems.
- Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
- Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
- Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
- Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
- Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
- Establish relationships with external cybersecurity partners, vendors, and service providers.
- Plan incident response activities, including investigating security breaches and recommending corrective actions.
- Participate in the change management process.
Required Qualification
- Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
- Experience: 3 to 4 years of experience in an IT security role.
- Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
- Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
- Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
- Strategic Thinking: Ability to align solution deliverables with the organization's goals.
Required Professional Skills
- Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
- Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
- Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
- Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
- Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
- Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
- Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.
Desired candidate profile
1. Cybersecurity Knowledge and Expertise
- Understanding of Threats: Knowledge of various cybersecurity threats such as malware, ransomware, phishing, DDoS (Distributed Denial of Service) attacks, insider threats, and zero-day vulnerabilities.
- Security Frameworks and Standards: Familiarity with industry-standard cybersecurity frameworks (e.g., NIST, ISO 27001, CIS Controls, etc.) and regulatory standards like GDPR, HIPAA, or PCI DSS that guide security practices.
- Security Technologies: Expertise in security technologies, including firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), antivirus software, VPNs, and encryption protocols.
2. Risk Management and Assessment
- Risk Analysis: Conducting risk assessments to identify vulnerabilities within the organization's IT infrastructure, applications, and networks.
- Vulnerability Management: Identifying and prioritizing security vulnerabilities, applying patches and updates, and testing systems for weaknesses that could be exploited by attackers.
- Security Audits: Performing regular security audits and assessments to ensure that security policies and procedures are followed and systems are compliant with industry standards.
3. Incident Response and Crisis Management
- Incident Detection and Investigation: Monitoring security systems and logs to detect potential security incidents, and conducting detailed investigations to determine the scope and nature of the incident.
- Incident Response Plans: Developing and implementing incident response protocols to address security breaches and minimize damage.
- Forensic Analysis: Conducting post-incident analysis to identify the root cause of security incidents, how the breach occurred, and how to prevent similar attacks in the future.
4. Network Security
- Firewall Management: Configuring and maintaining firewalls to prevent unauthorized access to the organization’s networks.
- VPN Setup and Management: Setting up and managing virtual private networks (VPNs) to ensure secure remote access for employees.
- Secure Network Architecture: Designing and implementing secure network architectures, ensuring segmentation, and minimizing the risk of unauthorized access or data exfiltration.
5. Data Protection and Encryption
- Encryption Techniques: Implementing encryption protocols for data at rest and in transit, including the use of secure file systems, SSL/TLS for web traffic, and encrypted email services.
- Data Loss Prevention (DLP): Implementing strategies and tools to prevent sensitive data from being leaked or accessed by unauthorized parties.
- Backup and Recovery: Ensuring that secure, encrypted backups of critical data are regularly made and can be quickly restored in the event of data loss or breach.
6. Endpoint Security
- Endpoint Protection: Installing and configuring endpoint protection software (antivirus, anti-malware) on all company devices, including laptops, desktops, mobile devices, and servers.
- Mobile Device Management (MDM): Managing and securing mobile devices that access company networks and data, ensuring they meet the organization's security requirements.
- Patch Management: Ensuring that all devices are up-to-date with the latest security patches and software updates to prevent vulnerabilities.