Closing: May 17, 2024
This position has expiredPublished: May 7, 2024 (13 days ago)
Job Requirements
Education:
Work experience:
Language skills:
Job Summary
Contract Type:
Sign up to view job details.
The Person
For the above position, the successful applicant should have the following:
- A BSc. Information Technology / Computer Science / Cybersecurity / Engineering (Electrical, Electronic) or related field
- A professional certification in either of the following; Certified SOC Analyst (CSA)/;Certified Incident Handler (E|CIH)/;Certified Threat Intelligence Analyst (CTIA)/;Certified Information Systems Security /Professional (CISSP)/;Certified Ethical Hacker (CEH)/;PENTEST+;Security+;Certified Information Systems Auditor (CISA);Certified Information Security Manager (CISM)
- At least 2 years’ experience in IT with at least 1 year experience in Cyber Security.
Responsibilities
The Person
For the above position, the successful applicant should have the following:
- A BSc. Information Technology / Computer Science / Cybersecurity / Engineering (Electrical, Electronic) or related field
- A professional certification in either of the following; Certified SOC Analyst (CSA)/;Certified Incident Handler (E|CIH)/;Certified Threat Intelligence Analyst (CTIA)/;Certified Information Systems Security /Professional (CISSP)/;Certified Ethical Hacker (CEH)/;PENTEST+;Security+;Certified Information Systems Auditor (CISA);Certified Information Security Manager (CISM)
- At least 2 years’ experience in IT with at least 1 year experience in Cyber Security.
- Monitor user and system activity to identify suspicious activities leveraging on security systems.
- Monitor network activity and investigate anomalous events and traffic trends
- Check security monitoring status of systems on monitoring tools and initiate remediation of noted gaps.
- Monitor alerts and alarms from security monitoring tools and initiate corrective actions.
- Configure and finetune security monitoring systems to make sure the Bank is sufficiently protected.
- Administer security tools ensuring optimal uptime and resource utilization.
- Investigate suspicious user and system events and identify breaches and root cause.
- Mitigate intrusion attempts through proactive response to incidents.
- Prepare manual and scheduled reports for various stakeholders.
- Research and stay up to date on technology and cybersecurity trends
Applications submitted via Fuzu have 32% higher chance of getting shortlisted.