Job Description & Requirements
The Cybersecurity Engineer is responsible for designing, implementing, and maintaining security infrastructure to protect the organization’s IT systems and networks. This role involves analyzing, preventing, and mitigating security risks, conducting vulnerability assessments, and ensuring the overall security posture of the organization. The Cybersecurity Engineer will work closely with other IT teams to integrate security measures into the infrastructure, identify threats, and respond to incidents.
Key Responsibilities:
Security Infrastructure Design & Implementation:
- Design and implement secure network architectures, systems, and services.
- Build and configure security tools, such as firewalls, IDS/IPS, VPNs, endpoint protection, and SIEM systems.
- Integrate security solutions and ensure they are aligned with the organization's goals and policies.
Vulnerability Management:
- Conduct vulnerability assessments, penetration tests, and security audits to identify potential weaknesses in systems.
- Perform remediation activities by applying patches, hardening systems, and working with development teams to address security vulnerabilities.
Incident Response & Management:
- Respond to and investigate security incidents (e.g., data breaches, malware, DDoS attacks) to contain and mitigate damage.
- Collaborate with the incident response team to provide forensic analysis, determine the cause of incidents, and develop solutions to prevent recurrence.
Security Monitoring & Threat Intelligence:
- Continuously monitor and analyze security logs, alerts, and data from various security tools to detect and respond to potential threats.
- Leverage threat intelligence feeds and analysis to stay updated on emerging security threats and trends.
- Implement proactive security measures, including vulnerability scanning and intrusion detection.
Policy Development & Compliance:
- Develop, implement, and enforce security policies, procedures, and best practices across the organization.
- Ensure compliance with relevant regulatory standards, including IM8, CCoP 2.0, and other industry-specific frameworks.
- Conduct regular security assessments and audits to ensure adherence to security policies and standards.
Security Tools & Automation:
- Manage and optimize security tools such as SIEM, antivirus/anti-malware, firewalls, encryption, and endpoint protection systems.
- Automate repetitive security tasks and processes to increase efficiency and reduce manual intervention.
Collaboration & Training:
- Work closely with development, operations, and network teams to implement security into the SDLC (Software Development Lifecycle) and IT operations.
- Provide cybersecurity awareness training and guidance to employees to promote safe practices across the organization.
Documentation & Reporting:
- Maintain detailed documentation for all security systems, incidents, and actions taken.
- Generate regular reports on the status of the organization’s security posture, incidents, and risk assessments for management.
Qualifications & Requirements:
- Qualifications: Bachelor's degree in Cybersecurity, IT, Computer Science, or equivalent experience.
- Experience: Minimum of 2 years in cybersecurity or security engineering, with expertise in designing, implementing, and managing security solutions (e.g., firewalls, VPNs, IDS/IPS, endpoint protection).
- Technical Skills: Proficiency in vulnerability management, penetration testing, and security tools (SIEM, IDS/IPS, antivirus).
- Strong understanding of network protocols (TCP/IP), firewalls, VPNs, proxies, and related technologies.
Familiarity with compliance standards (e.g., IM8, CCoP 2.0, NIST).
Scripting expertise (Python, PowerShell, or Bash) for task automation and incident response.
Hands-on experience with penetration testing tools (e.g., Kali Linux, Metasploit, Burp Suite, Nmap).
- Certifications (preferred): Certified Ethical Hacker (CEH), CompTIA Security+, or CySA+.
- Soft Skills: Strong analytical, troubleshooting, and communication skills (both written and verbal).
- Additional Knowledge: Security operations, incident response, and disaster recovery processes.
Shortlisted candidate will be notifed.