A glimpse of what you’ll do:
- Monitor security systems
- Perform non-routine security monitoring activities
- Perform prioritization and allocation of security incidents
- Track security monitoring rules and alerts
- Compile regular reports on the performance of security operations
- Maintain security operations
- Assist with the implementation of agreed security system changes and maintenance routines
- Assist with implementation of new security programs
- Support vulnerability, penetration testing and assessments
- Support the development of reports on security penetration testing results
- Recommend security products, services and/or procedures
- Support the alignment of security systems with established service agreement standards
- Support the implementation of new enterprise security architecture, technologies and enhancements
- Respond to queries
- Support live response to security issues
- Support investigation of security breaches such as forensic threat investigation
- Support the resolution of security related issues
- Support the simulation of user problems to identify security system drawbacks
- Recommend security system modifications to reduce user problems
- Facilitate compliance
- Assist with the implementation security policies, procedures and programs
- Educate users on the security standards and practices
- Identify improvement areas to existing security policies and procedures
- Deliver user training
- Optimize security system performance
- Support piloting of new tools, technologies, and processes as well as installation of hardware and software
- Support security system testing and ongoing optimization or changes such as scheduled upgrades and updates
- Maintain documentation of all optimization activities
- Suggest improvements to operational processes, procedure manuals, and documentation
What you’ll need:
- Bachelor's Degree in Computer Science, IT, or equivalent fields
- At least 5 years working experience in vulnerability management, incident response, and risk assessment experience, and able to articulate security policies
- Technical expertise in the following
- Tenable Nessus
- SIEM
- Rapid7
- Wireshark
- IDS
- Splunk
- Nmap
- Burp Suite
- ELK Stack (Elastic search, Logstash, Kibana)
- Graylog
- Coordinate ongoing reviews of existing security programs/protocols and planned upgrades
- Monitor compliance to security policies, regulations, rules and norms
- Perform Firewall rule reviews/clean-upsas part of housekeeping initiatives
- Reviewing authorized software
- Responding to security incidents
- Experience in AD/ID administration (Active Direc/Identity) as per best security practices.
- Look at ongoing requests – assessments of installing apps.
- Exposure in IM8 or equivalent
Benefits
- AL: up to 21 days
- ML: 14 days
- Flexibenefit: $660 per year
- Bonuses: total package ranging from 14-15 months
Interested applicants: kindly submit your resume to [email protected]