Closing: Apr 30, 2024
1 day remainingPublished: Apr 16, 2024 (14 days ago)
Job Requirements
Education:
Work experience:
Language skills:
Job Summary
Contract Type:
Sign up to view job details.
- B.Sc in Computer Science or related fields
- 5+ years of experience in Cyber security or roles with a focus on Application, Operating systems & Database security.
- Experience with Comptia Security, CCNA Routing & Switching, CCNA Security.
- Experience with Windows/Unix/Linux Operating systems with a focus on cybersecurity
- Relevant industry certifications (i.e. CISSP, CISA, CRISC, CISM, COMPTIA+, Imperva Database administrator, Puppet practitioner, CASP+ CEH, GCIH, GCIA, OSCP) is an added advantage.
- The knowledge of Fortinet, Eset, Check point, Microsoft and ASSO will serve as added advantage
Responsibilities
- B.Sc in Computer Science or related fields
- 5+ years of experience in Cyber security or roles with a focus on Application, Operating systems & Database security.
- Experience with Comptia Security, CCNA Routing & Switching, CCNA Security.
- Experience with Windows/Unix/Linux Operating systems with a focus on cybersecurity
- Relevant industry certifications (i.e. CISSP, CISA, CRISC, CISM, COMPTIA+, Imperva Database administrator, Puppet practitioner, CASP+ CEH, GCIH, GCIA, OSCP) is an added advantage.
- The knowledge of Fortinet, Eset, Check point, Microsoft and ASSO will serve as added advantage
- Provide security monitoring and incident response services required by the business, in alignment with Cyber Security’s mission to protect Client’s Digital Assets (including Industrial Control Systems) to a level of confidentiality, integrity and availability commensurate with the threat to those assets and their value to Client.
- Act as internal expert on matters relating to intrusion detection and incident response.
- Lead investigations into network intrusions and other cyber security breaches. Provide a coordinated response to complex cyber-attacks that threaten company’s assets, and computer systems.
- Contribute to the development and improvement of security monitoring and incident response processes and solutions as required to support our cyber security program.
- Operate security monitoring and incident response tool sets with a focus on continuous improvement.
- Research and recommend solutions for incident response and digital forensics.
- Document security breaches and assess the damage they cause
- Work with the security team to perform tests and uncover network vulnerabilities
- Fix detected vulnerabilities to maintain a high-security standard
- Stay current on Information Technology (IT) security trends and news
- Develop company-wide best practices for IT security
- Perform penetration testing
- Help colleagues install security software and understand information security management
Applications submitted via Fuzu have 32% higher chance of getting shortlisted.