Information Security OperationsVulnerability ManagementConduct regular vulnerability assessments of all application servers.Ensure timely patching and remediation of identified vulnerabilities.Endpoint SecurityMaintain compliance of all endpoints with Falcon CrowdStrike antivirus and EDR.Ensure consistent endpoint protection coverage across the organization.Security Incident ResponseMonitor and respond to alerts from SIEM tools in coordination with Corporate IT.Investigate and resolve security incidents such as malware, phishing, and breaches.Network SecurityMonitor and secure network traffic using firewalls, IDS / IPS.Configure and maintain secure LAN / WAN, Wi-Fi, and VPN access.Manage Wi-Fi security at plant and corporate office.Tool Deployment & ManagementManage deployment and operations of security tools (EDR, DLP, encryption, etc.).Liaise with third-party vendors for security tools and updates.B. Governance, Risk, and Compliance (GRC)
- Policy & Procedure Management
- Deploy, maintain, and periodically review IT policies and procedures.
- Modify policies based on business requirements or corporate IT recommendations.
- Audit & Documentation
- Prepare documentation for internal and external IT audits.
- Support audit processes and provide necessary evidence and responses.
- Compliance
- Ensure compliance with applicable standards (ISO 27001, GDPR, SOC 2, etc.).
- Conduct internal compliance checks and assist external auditors.
- Risk Management
- Perform periodic IT risk assessments.
- Identify security risks and recommend mitigation strategies to IT leadership.
C. Identity & Access Management
- User Lifecycle Management
- Handle user provisioning and de-provisioning in systems and applications.
- Implement and monitor role-based access control and MFA.
- Access Audits
- Periodically review user access rights.
- Address access anomalies and unauthorized permissions.
D. Security Awareness and Training
- Training & Awareness
- Conduct cybersecurity awareness sessions for all employees.
- Develop and distribute best practice guides and security communications.
Skills Required
Gdpr, Vulnerability Management, Mfa, Dlp, Endpoint Security, Siem Tools, Ips, Encryption, Iso 27001, EDR, Ids, Firewalls