Key Responsibilities:

Aid in the design and implementation of IT Security Solutions

  • Design and develop security solutions and platforms including, Defense, Audit, Monitoring and Detection, Analysis and Reporting etc.
  • Practical planning and implementation of effective cyber defense and detection technologies
  • Work with IT Ops on identified systems vulnerabilities to seek long term solutions.

Document relevant security tasks, activities and outputs

  • Formulate and evolve document standards using known best practices:
  • Improved documentation aligned to industry best practices.
  • Enhanced reporting with clear data driven results for use during security assessments, incident analysis and root cause investigations.

Manage and track security incident remediation efforts

  • Manage key stakeholders and technology owners throughout remediation processes and provide corrective recommendations as needed:
  • Lead remediation recommendations and ensure incident closure and compliance.
  • Review and enhance evidence collection of all security incidents for reporting, compliance, and improvement purposes.
  • Monitor networks and connected devices for security issues.
  • Proactively respond to and report on DLP, IPS/IDS, ATP, APT detection, help device on remediation actions and improvement plans.
  • Track and help manage remediation efforts ensuring a mature document trail.

Detect and respond to organisational threats

  • Help manage security incidents to ensure identification, root cause, remediation, and improvement planning:
  • Use formal and agreed processes, methods, and standards to address incident management in a mature manner, ensuring effective remediation, business impact and root cause analysis.
  • Investigate all cyber security incidents.
  • Aid in the documentation of security breaches and provide remediation recommendations.
  • Assess security incidents and measure organisational impact.
  • Work with IT Ops on identified systems vulnerabilities to seek long term solutions.

Enhance cyber security vulnerabilities and threat detection systems

  • Proactively evaluate and enhance vulnerability and threat detection systems across the organisation.
  • Reduced business risk and the development effective threat detection systems.
  • Ensure and improve organisations IT Security and regulatory compliance.
  • Perform regular review of all defense mechanisms and make recommendation for improvement and aid in the implementation thereof:
  • Development and implementation of effective first-line of defense protection solutions
  • Aid in the design and implementation of non-intrusive unstructured data discovery tools and methods across all attached corporate networks:
  • Implement and report against scheduled sensitive data discovery.
  • Stay current on IT security trends and news (Trusted 3rd Party Notifications)
  • Research security enhancements and make recommendations to management.
Minimum Requirements:

Qualifications & Experience:

  • Undergraduate or masters degree preferably in one of the following areas Business Management, Information Systems, Computer Science, Engineering, and other related majors
  • And /or technical experience working within large IT type environments.
  • Preferred technical certifications or security certifications.
  • 10+ Years of IT experience including management.
  • A Certified Information System Security Professional (CISSP)
  • Certified Information Security Manager (CISM) or equivalent certification from a recognised professional organisation is required,

Learn more/Apply for this position