Job Description
As a Cyber Security Specialist, you are responsible to architect, design, review and implement cyber security resilient in our product and projects. You are familiar to cloud security architectures and solutions, making sure the companies can operate in a safe, secure environment. You monitor, research, and analyze security risks to mitigate threats and security attacks that may occur to or within the cloud. You will implement customized application security assessments for client-based asset risk, corporate policy compliance as well as conduct vulnerability assessment. You should have an advanced understanding of cloud, networking, data traffic flow, system administration, cloud architecture, OSI model, anti-malware, anti-virus, defense-in-depth and common security elements.
The specialist’s focus is not only limited to assessing whether vulnerabilities exist but also how those risks could be mitigated which can help provide projects/organizations with more confidence about system stability and security going forward.
Responsibilities
- Develop and build cloud security architectures and solutions
- Monitor, research, and analyze security risks to mitigate threats and security attacks
- Solution design for product to help reduce attacks on cloud service data storage, create preventative features, and implement corrective controls when breaches do occur
- Regular security and risk assessment for system solutions
- Support on audit trial for security related implementation
- Consultancy on software and hardware for security vulnerabilities and risks
- Plan VAPT, execution, result analysis and provide fix recommendation.
- Provide guideline such as coding, key management, hardening, patch management, backup management, incident management, etc.
- Familiar to IM8 requirements and CIS, NIST security benchmark.
- Familiar to cyber security tools to perform preliminary scan.
- Familiar to public cloud infrastructure such as Azure, AWS, GCP and Huawei.
Skills Required
- Strong IT skills and knowledge including cloud, network, hardware, and software
- A forensic approach to challenges
- Good coordinator and team worker
- A deep understanding of how hackers work and ability to keep up with the fast pace of change in the criminal cyber-underworld
- Ability to seek out vulnerabilities in IT infrastructures
- Meticulous attention to detail