Job Description
Key Responsibilities
- Analyze business requirements and provide objective advice on the use of IT security requirements.
- Analyze network traffic, intrusion attempts, activity logs, and system alerts for trends, anomalies, and potential security breaches.
- Respond to security incidents and IT security issues during and after business hours (onsite or remote).
- Gather feedback from end-users to continue improving systems.
- Liaise with vendors for POC’s and demo of new IT security requirements.
- Assist in IT security projects and day-to-day IT Security operations.
- Be up to date about the latest security trends.
- Prepare documentation about the security breaches and the damage caused.
- Providing guidance to amateur computer users when they want to know about security procedures.
- Identify and review violations of security procedures.
- Monitor and maintain data protection tools such as data leakage prevention (DLP), data classification and labelling, e-mail filtering gateways, end-point detection and response (EDR), mobile device management (MDM), and other SOC dashboards.
- Day to day administration of IT security technical controls like firewalls, web application firewalls (WAF), network access control (NAC), privileged access manager (PAM), etc.
- Provides on-call IT security support to end-users.
- Conduct periodic health check of security devices and servers and maintains accurate record.
- Perform other related duties as assigned.
- Analysing security requirements and recommending improvements.
- Assist line-manager/supervisor in audit and compliance activities.
- Keeps current with emerging security alerts and issues.
Qualifications, Experience and Skills
- Relevant Bachelor’s degree or Diploma
- Certified Ethical Hacker (CEH) or CompTIA Security+
- Advanced training in IT security or vendor certifications may be advantageous
- 5-7 years of experience in administering and managing IT security systems with at least 3 years of experience in an analytical role preferred.
- Experience in information security audit and compliance will be an added advantage
Technical Competencies
- Experience in managing data protection mechanisms preferably on cloud platforms like Microsoft purview.
- Knowledge of Microsoft defender suite and the Identity and access management suite.
- Understanding of security solutions such as NAC, PAM, EDR, DLP, SIEM, SOAR and NDR.
Knowledge of security configuration in cloud platforms e.g., OCI, Azure and Microsoft office 365