Hybrid Analista de Ciberseguridad bei Recursos Humanos-Reclutamiento y Seleccion Campo-Baja California
Recursos Humanos-Reclutamiento y Seleccion Campo-Baja California · Guadalajara, Mexiko · Hybrid
- Junior
- Optionales Büro in Guadalajara
Job Contributions and Key Responsabilities:
Information Security Governance
- Executing the Information Security Strategy implementation
- Implement, document and maintain cybersecurity controls.
- Provide accurate information to deliver security metrics
- Develop and maintain the information security policy framework documents
- Document Information Security Policy Exceptions.
Risk Management
- Perform risk assessments and address risks to reduce their impact.
- Document and maintain risk registries.
- Execute vendor risk assessments
- Operate risk remediation activities for cybersecurity risks.
- Monitor proactively cybersecurity risks.
- Learn new cybersecurity trends and cybersecurity standards or best practices.
Information Security Incidents
- Monitor and investigate cybersecurity breaches and cybersecurity incidents.
- Communicate cybersecurity incidents.
- Follow up post-mortem activities
- Document and remediate security incidents.
- Travel to remediate cybersecurity incidents and events.
Compliance
- Prepare information for security audits whether performed by organization or 3rd party.
- Maintain legal and compliance requirements registers for IT, Information Security and Privacy.
Awareness
- Execute the Information Security Awareness Program
- Perform Information Security Awareness Tests.
- Report Information Security Awareness Metrics.
- Travel to perform information security awareness on-site trainings.
Security Operations
- Monitor and mitigate 365*24*7 security operations events.
- Assess and remediate current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement.
- Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.
- Coordinate the performance of Penetration Testing exercises and Vulnerability Assessments with 3rd parties.
- Execute and maintain Business Impact Analysis, Business Continuity and Disaster Recovery plans.
- Monitor, validate and mitigate phishing reports.
Knowledge:
- Breadth and depth of cyber security knowledge - Basic
- Grasps features, functions, and value associated with technology products - Basic
- Experience in problem solving, coding, scripting, management and development of applications, and security workflow design - Basic
- Deep experience with a variety of industry leading security products - Basic
- Experience developing and administering cyber security - Basic
Skills:
- Operates in complex environments and takes responsibility - Basic
- Effectively manages projects - Basic
- Identifies and resolves problems in a timely manner. Gathers and analyzes information skillfully. Develops alternative solutions. Works well in group problem solving situations - Basic
- Analytical - Synthesizes complex and/or diverse information. Collects and researches data. Uses intuition and experience to complement data. Designs workflows and procedures - Basic
Abilites:
- Strong written and verbal communication, including ability to teach both formally and informally - Basic
- Problem Solving - Basic
- Demonstrates and encourages adaptability - Basic
Education Level:
- Computer Science
- Information Technology
- Cybersecurity
Years of Experience:
- 1 – 3 in areas related to the position
Licenses:
- CompTIA Security+
- Certified Ethical Hacker (CEH)
- Azure Fundamentals
Software necesario:
- Office 365 - Basic
- Microsoft Azure - Basic
- CISCO Technologies - Basic
- Palo Alto Technologies - Basic
- OWASP Top 10 - Basic
- Wireshark- Basic
- NMap - Basic
- Linux - Basic
- Javascript - Basic
- Windows Server - Basic
Idiomas:
- Ingles - Advanced