Job Details
Experience Needed:
Career Level:
Education Level:
Salary:
Job Categories:
Skills And Tools:
Job Description
- Responsible for reviewing system logs and incidents on a daily basis and handling the investigation to avoid potential incidents.
- Participate in the day to day administration and management of information security tools as well as third party managed security service providers.
- Implement and monitor threats and vulnerability management processes, inclusive of vulnerability scanning and remediation efforts, monitoring of CVE and vendor notifications, etc.
- Conduct regular audits using tools such as vulnerability scanners, IDS /IPS, SIEM and Anti virus.
- Audit all directory services and privileged accounts on a regular basis to avoid any improper privileges.
- Ensure that all information security policies and procedures are applied across the firm.
- Conduct in house penetration testing and code reviews of prosper applications and platform to ensure their compliance with international security standards.
- Conduct regular security assessments of internally developed applications to generate security reports to assess needs and security enhancements requirements.
- Implement solutions for monitoring applications security logs, end point application whitelisting, network and host based forensic readiness, DoS/DDoS mitigations, Database access monitoring solutions, PKI Implementations etc.
Job Requirements
- Experience with information security risk management tools and methodologies.
- Experience with data privacy/security international regulations.
- Experience with endpoint security solutions, IDS, NGFW, WAF, and SIEM solutions.
- Experience in system administration