Cyber Security
3 months ago
- Develop andimplement security policies protocols andprocedures
- Conduct regular security assessmentsand vulnerability tests
- Monitor network trafficfor unusual activities and potentialthreats
- Implement and manage security tools andtechnologies
- Respond to and investigatesecurity breaches and incidents
- Providesecurity awareness training and education tostaff
- Manage and oversee security complianceinitiatives
- Stay updated on the latest securitytechnologies and threats
- Participate in thedevelopment of security architecture
- Conductpenetration testing and ethicalhacking
- Collaborate with crossfunctional teamsto address security issues
- Lead incidentresponse and recovery efforts
- Contribute tosecurity risk management and mitigation
- Managesecurity infrastructure and accesscontrols
- Ensure compliance with data protectionregulations
- Bachelors degree inComputer Science Information Technology or relatedfield
- Certifications such as CISSP CISM orCEH
- Proven experience in cyber security orinformation security roles
- Familiarity withsecurity frameworks such as NIST ISO 27001 orCIS
- Expertise in network security and firewallmanagement
- Strong understanding of securityincident response and management
- Experiencewith cloud security and infrastructureprotection
- Knowledge of encryptionauthentication and access control
- Excellentanalytical and problemsolving skills
- Ability tocommunicate complex security conceptseffectively
- Proficiency in security riskassessment and compliance management
- Uptodateknowledge of current threats and security bestpractices
- Strong teamwork and collaborationskills
- Experience in security architecturedesign and implementation
- Ability to managemultiple projects and prioritieseffectively
cyber security,networktraffic monitoring,security technologies,projectmanagement,cross-functional collaboration,vulnerabilitytests,security infrastructure management,threatintelligence,security compliance,security riskmanagement,compliance management,security,ethical hacking,networksecurity,firewall management,encryption,security incident responseand management,security awareness training,securitypolicies,collaboration,penetration testing,security riskassessment,security awareness,teamwork,riskmanagement,compliance,security tools,security bestpractices,authentication,incident response,securityarchitecture,security architecture design,cloud security,accesscontrol,security assessments,security breaches investigation,dataprotection regulations compliance,current threatsknowledge