Leverage the existing cybersecurity tools and capable to identify open-source tools to discover threat agent actions.
Identify potential threats and mitigation strategies to enable a proactive defense mechanism before an actual security incident.
Design and implement a security incident response process.
Act as the primary control point during significant information security incidents, manage the development of incident response plans and generate detailed reports.
Identify and propose the implementation of the key information security initiatives, plans, practices and tools to the management.
Proactive support on the approved information security projects, internal / external security audits, internal audits, application security assessment and reviews and compliance.
Identify and understand potential and emerging information security threats and vulnerabilities and implement an effective communication channel across the appropriate teams.
Detect and respond to cyber security threats and implement remediation controls.
Perform GRC assessment on IT infrastructure and Applications and prepare plan to mitigate.
Hardening reviews of endpoints, networks and servers.
Manage security compliance for end points, networks, servers, databases, etc.
Proficient in operating cyber security solutions to protect IT Infrastructure and data it we are looking for :
Bachelors degree specializing in Information Security, Computer Science, Information Management Systems, or relevant work experience.
Minimum 6 years of experience in Cyber Security.
Individual Contributor and capable of working independently.
Strong technical skills relevant to Information Security such as SIEM, IDAM, PIM / PAM, Breach Attack Simulation and Micro segmentation.
An excellent knowledge and deep understanding of the complex network and end point security principles and concepts.
Practical knowledge of operating systems (such as : Windows, Linux, Hypervisors).
Detailed experience with vulnerability scanning solutions.
Ability to identify and mitigate network vulnerabilities and an understanding of their remediation.
Required to assist with root cause identification for incident management.
Should be acquainted with Information Security Industry standards / best practices and relevant regulations (such as : SSAE16, SOC 2, PCI DSS, HIPAA, GLBA, FISMA, NIST, ISO27000, CobiT, ISF, OWASP, SANS).
Must have proficient analytical, technical research and detail-oriented skills.
Available to work on-call whenever Type : Full-Time.