Purpose |
A Professional in charge of Cyber-Security will contribute and help to improve IT policies, strategies, processes and systems typically through analysis and strategic thinking by conducting research and analysis in order to identify performance gaps and solutions to IT risks and to recommend innovative solutions to improve the IT security during operations.
|
Key duties and responsibilities |
- Set and implement user access controls and identity and access management systems
- Monitor network and application performance to identify irregular activities
- Perform regular audits to ensure security practices are compliant
- Deploy endpoint detection and prevention tools to prevent malicious hacks
- Set up patch management systems to update applications automatically and regularly monitor the patching management system to ensure RRA systems are well secured
- Implement comprehensive vulnerability management systems across RRA systems and staff devices on-premises and in the cloud where applied
- Monitor and support the security part of rra vmware infrastructure or any other virtualized infrastructure
- Be part of a proactive incident response team to ensure that, the incident response plan is being tested for and resolve system vulnerabilities, maintaining strong security best practices and providi
- Monitor and support the security part of virtualized infrastructure
- Ensure that all users receive periodic IT security awareness briefing
- Closely collaborate with both internal and external reviewers
|
Required Academic Qualification |
Preferred Qualifications |
- Bachelor’s Degree in Information Technology specialized in Information Technology
- Bachelor’s Degree in Computer Sciences specialized in Information Technology
- Bachelor’s Degree in Computer Engineering specialized in Information Technology
- Bachelor’s Degree in Electronic and Telecommunication specialized in Information Technology
- Bachelor’s Degree in Science, Electronics and Telecommunication specialized in Information Technology
- Bachelor’s Degree in Science in Information Technology
- Bachelor’s Degree in Science with Honours in Computer Science
- Bachelor’s Degree in Science with Honours in Information Management
- Bachelor’s Degree in Science with Honours in Software Engineering
- Bachelor’s Degree in Science with Honours in Network & Communication Systems
- Bachelor’s Degree in Science with Honours in Information System and Management
- Bachelor’s Degree in Science with Honours in Software Engineering
- Bachelor’s Degree in Business Information Communication and Technology
|
Relevant Qualifications |
Required Trainings |
- Certified Information Systems Security Professional (CISSP) Training
- Certified Information Security Manager (CISM)
- Certified Ethical Hacker (CEH)
- Systems Security Certified Practitioner (SSCP)
- GIAC Certified Incident Handler (GCIH)
- Offensive Security Certified Professional (OSCP)
- VMWARE Certified Technical Associate – Security
- Implementing and Operating CISCO Security Core Technologies (SCOR) is highly recommended
|
Skill Type |
Required Skill |
Required Proficiency level |
IT Security |
Information security management based on ISO 27001 STANDARD |
medium |
IT Security |
Identity and access management |
advanced |
IT Security |
Digital forensic |
medium |
IT Security |
Threat intelligence analysis |
advanced |
IT Security |
Risk and compliance auditing |
advanced |
IT Security |
Networking |
advanced |
Required Competencies |
- Analytical skills
- Problem solving
- Risk management
- Communication
|
Required Experiences |
- 2 years experience in Experience as a Cybersecurity professional on securing IT infrastructure, IT applications and managing IT Risks.
|
Click here for details & Apply