Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Aug 29, 2024
    Deadline: Not specified
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    Optimal Growth Technologies provides organizations of all sizes with the best, most trustworthy solutions. In the ever-evolving technology market, we believe that companies need reliable allies who can guide them through the challenges that accompany technological growth
    Read more about this company

     

    Cyber Security Specialist

    Role Purpose

    • The Cyber Defense teams mission is to deliver a highly effective end to end 24x7 Cyber Defense service.
    • They are responsible for proactively identifying threats and vulnerabilities; detecting and mitigating cyber events; and managing cyber security incident responses to minimise service impact and provide a secure digital future for our customers.

    Brief Description

    • Coordinate operations of the Cyber Security Defend stakeholders and team
    • Implement, Upgrade, maintain and Refine End-to-End Security Monitoring
    • Timely Manage Proactive & Reactive Security Incident Management Processes, Communication and Response Plans
    • facilitate implementation, management and optimization of Cyber Defense policies, standards and procedures
    • ensure adequate CAPEX\OPEX budget, resource and management focus is on cyber security risks
    • Implement actions to close risks, Audit & Reviews (Internal and External) on Security Monitoring and Incident Management
    • Improvement of the Cyber security posture of the company through several initiatives, including but not limited to Cyber Security Baselines.

    Key Roles:

    Impact on the business

    • Coordinate optimization of the Operational & Monitoring Defense cyber security baselines (CSB) controls across all relevant business areas and processes
    • Optimize and maintain respective Monitoring Cyber Security controls and requirements across all environments
    • Responsible for the set-up, execution and maintenance of the security incident management and coordination process in conjunction with incident management capabilities
    • Support all internal and external audits around Technology systems and processes, ensure these systems are free from known Technology audit findings and ensure all audit findings in these systems are closed within agreed timelines

    Qualifications

    • Degree in Electrical Eng. /Computer Science/information Technology or equivalent Technology-related degree
    • At least one professional Information Security Qualification: CISSP/CISM/CISA
    • Advanced competencies in Network Security: CCNP or CCIE (Security)
    • Advanced competencies in Microsoft, Linux or Unix Operating Systems administration
    • Advance competencies experience in Information Security Technologies

    Skills and Experience

    • Minimum of 3 years focused Security experience in Incident Management, Intrusion Analysis, Network troubleshooting or Reverse Engineering.
    • Minimum of 2 years Security tooling management and deployment experience with Forensic tools, Security Logging and EDR Tooling
    • Experience in design, delivery and support of Information Security solutions to customers will be and added advantage.
    • Good communication skills and team player.
    • Experience in the use of security tools.
    • Project management skills, and proven task execution (getting things done).
    • Superior Report writing skills.
    • Analytical Thinking

    Other Roles:

    Customers, Supplier and Third parties

    • Support compliance with Legal, Regulatory and key stakeholders requirements across the Technology domains
    • Responsible for monitoring of compliance of the Cyber security Monitoring and Incident services contract, to ensure it is within agreed SLA
    • Coordination of analytical processes and incident response measures
    • Ensure proper monitoring implementation and change management processes compliance for all planned and emergency changes in Technology systems

    Leadership, Planning and Human Resource Management:

    • Manage assigned the Cyber security CAPEX\OPEX budgets and planning, in alignment with the company and Group strategy
    • Manage the Cyber security subordinate resources (FTEs and contractors) for their tasks/job descriptions effective implementations
    • Skills development within Cyber security department
    • Performance Management of the Cyber security team
    • Provide input to Security Policies and requirements on Technology security methods and technologies
    • Provide regular and accurate management reporting on Cyber security service performance

    Innovation and Change:

    • Maintain the Incident management & Monitoring (SPDA) processes of the GDPR and business requirements
    • Continually review and enforce security policies and controls, to support business requirements and changing security landscapes
    • Set-up of analytics framework and tools
    • Drive continuous improvement through simplification of key cyber security processes

    Communication:

    • Drive internal and third-party service review meetings covering performance, service improvements, quality and processes
    • Make recommendations for Cyber security service Improvement
    • Plans and ensure actions are followed through to completion in a timely manner
    • Support information security awareness and training to all users and third-party vendors
    • Driving incident planned and emergency communication processes to both internal and external audience
       

    Method of Application

    Interested and qualified? Go to Optimal Growth Technologies on www.careers-page.com to apply

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at Optimal Growth Technologies Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail