Job Description
Essential Qualifications/Experience:
- Secondary educational qualification with 3 years post-related experience
- At least 4 years practical experience of implementation and maintenance of cyber security systems within a large organization
- Working experience administrating and monitoring cyber security software
- Good understanding of cyber security systems and the ability to work independently to solve
- problems
- Working experience troubleshooting technical issues and providing technical support to end-users
- Detailed knowledge and working experience of security and networking technologies including IPv4, Firewalls, Virtual Private Networks, Proxy Servers, Intrusion Detection and Forensic tool
Desirable Qualifications/Experience:
Security Professional certification (CEH, GIAC, ISC2, or other relevant certification)
Duties/Role:
Information security
- Applies and maintains specific security measures as required by organisational policy and local risk assessments
- Contributes to the identification of risks that arise from potential technical solution architectures
- Suggests alternate solutions or countermeasures to mitigate risks
- Defines secure systems configurations in compliance with intended architectures
- Supports investigation of suspected attacks and security breaches
Information assurance
- Follows standard approaches for the technical assessment of information systems against information assurance policies and business objectives
- Makes routine accreditation decisions
- Recognises decisions that are beyond their scope and responsibility level and escalates according
- Reviews and performs risk assessments and risk treatment plans
- Identifies typical risk indicators and explains prevention measures
- Maintains integrity of records to support and justify decisions
IT infrastructure
- Carries out routine operational procedures, including the execution of specified automation
- tools/scripts
- Contributes to maintenance and installation
- Monitors and reports on infrastructure performance to enable service delivery
- Resolves issues or refers to others for assistance
Vulnerability assessment
- Undertakes low-complexity routine vulnerability assessments using automated and semi-automated tools
- Escalates issues where appropriate
- Contributes to documenting the scope and evaluating the results of vulnerability assessments
Information Security Administration
- Works with access controls for firewalls and endpoint security solutions
- Assists in the operation of day-to-day administrative transactions and systems
- Performs periodic system backups and produces standard monitoring reports
- Coordinates user access and maintains security checklists and authorization tables
- Tests the effectiveness of new or revised information security procedures and tools
Information Technology (IT) Security Policies
- Performs information gathering and research on key elements of IT security policies
- Assists senior colleagues in identifying and analysing critical issues in IT security policies
- Executes IT security policies and standards within a specific region in organization
- Conducts performance reviews on implementation of IT security policies
- Generates status reports for senior management to ensure the implementation of IT security policies
Job Tags
Work experience placement, Local area, Remote job,