Plan, implement and upgradesecurity measures and controls.
Establishplans and protocols to protect digital files and informationsystems against unauthorised access, modification and / ordestruction.
Maintain data and monitorsecurity access. Configure security policy for each application anddatabase.
Ability to implement the bestpractices of security standards for applications, databases, andservers.
Analyse and monitor antivirus and enddetection and response (EDR / EPP) systems.
Incident handling and malware analyses.
Manage the security policy at FS load balancer using theASM module.
Perform vulnerability testing,risk analyses, and security assessments.
Conduct internal and external security audits.
Anticipate security alerts, incidents, and disasters andreduce their likelihood.
Manage and monitorintrusion detection and prevention systems.
Ability to work independently on initiatives with littleoversight, motivated and willing to learn.
Manage network, intrusion detection, and preventionsystems.
Analyse security breaches todetermine their root cause.
Managevulnerability and patch management solutions.
Recommend and install appropriate tools andcountermeasures.
Define, implement andmaintain corporate security policies.
Trainfellow employees in security awareness and procedures.
Previous experience in data analytics / data mining in acyber-security environment.
Technicalexpertise regarding data models, database design and development,data mining, and segmentation techniques.
Strong knowledge of and experience with reportingpackages / visualization tools & databases
Sound knowledge ofITSM / ISMS processes and tools.
Adept atqueries, report writing, and using visualization tools.
Ability to work independently on initiatives with littleoversight.
Ability to be comfortabledelivering messages across a wide spectrum of individuals havingvarying degrees of technical understanding.
Strong leadership skills and qualities, which enable youto work with peers and various levels of management.
Proven ability of risk-oriented approach.
Good interpersonal and communication skills.
105 / IPS, penetration and vulnerabilitytesting.
Good understanding of DLP, APTandvulnerability management solutions
Hands-onworking knowledge in TCP / IP, computer networking, routing andswitching, firewall and Intrusion detection / prevention protocols,Windows, UNIX and Linux operating systems, network protocols, andpacket analysis tools, C, C++, C#, Java or PHP programminglanguages.
Fair understanding Cloud computingand cloud security framework, IaaS / SaaSmodels. Manage, monitor andfine-tune Security Information and Event Management (SIEM)solution.
Security Information and EventManagement(SIEM).
Industry certifications insecurity such as CEH / CISSP / SANS / OSCP / OSCE / CERST, minimum of twocertificates in good standing.