-Monitor and maintain all network appliances that includes firewalls, routers, switches and wireless access points.
-Monitor and maintain the internet, email and web security for entire organization.
-Continual of tracking, monitoring, analyzing, and resolving any vulnerability or security issue. Monitor on new CVE and ensure affected systems are being patched accordingly.
-Respond and resolve any vulnerability or security incident that may arise.
-Act as the point of contact on any security incidents to respond, isolate, remediate, or resolve the incident quickly.
-Assess adequate access controls based on principles of least privilege and need-to-know principle.
-Identify gaps, inconsistencies and other integrity issues in technology controls and risk metrics and recommend solutions.
-Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans.
-Stay updated on new cybersecurity threats and to adapt CIS Benchmarks to proactively safeguard any new emerging security risks.
-Make sure that IT and Cyber security framework and policies are updated on time and up to date.
-Safeguard all network elements including but not limited to computer networks, local area networks (LANs), wide area networks (WANs), internet connections, intranet, VPNs, VLANs, VoIP and other data communication systems.
-Create user awareness with continuous education on Cybersecurity.
(Apply now at
; Requirements:- Key Skill Requirements:
-Proficiency in conducting regular vulnerability assessments of the systems to prevent any security incident.
-Awareness of the latest methods used by hackers and malicious elements to break into systems.
-Competency to use the available tools to discover any dubious movement in the network and system.
-Knowledge of cyber laws and compliance requirements as per the law of the land.
-Ability to conduct an in-depth analysis of computer networks and identify any vulnerabilities in the system applications, database, cloud, network infrastructure, and/or digital data.
Qualification and Experiences requirement:
-Bachelor's degree in Computer Science, Information Systems, or equivalent education or work experience.
-Minimum 3-5 years of prior relevant experience.
-Advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements.
-Hands-on experience analyzing high volumes of logs, network data (e.g., Full-Packet Capture FPC), and other attack artifacts in support of incident investigations.
-Experience with vulnerability scanning, monitoring, cyber defending tools or solutions.
-Experience on Office365 and other Cloud Security (e.g., GCP, AWS, Azure).
-Understanding of mobile technology and OS (e.g., Android, Huawei, iOS, Windows), VMware technology is a plus.