
Exponent – Faça as suas entrevistas técnicas com sessões de simulação e formadores especializados de empresas de topo.
Patrocinado por ExponentJob Description Summary:
Establish and improve the IT security process for SMART.
To improve the security posture of SMART through the implementation of various IT security initiatives such as SASE, EDR/MDR, NAC, SIEM, SOC, Identity and Access Management, Data Leakage Prevention, Privilege Identity Access Management.
Perform day to day security operations, monitoring and compliance.
Job Description:
Responsible for deploying products/solutions for the various security initiatives such as (but not limited to) Zero Trust Architecture, SIEM, cyber threat intelligence, setup of the Security Operations Centre, data leakage prevention, identity & access management.
Define business case for projects/solutions, developing roadmaps to enable future state, and managing implementation to achieve tangible benefits.
Successfully manage project timeline, resources and deliverables, present regularly to stakeholders and team members.
Performing day to day security operations, monitoring and compliance to ensure that the SMART organization is protected against external & internal threats.
Job Requirements:
At least Bachelor’s degree in Computer Science or any related major.
At least 8 years of work experience in IT, and at least 4 years of recent experience in IT security covering the fields of IT security project implementation and operations in areas such as:
Zero Trust architecture
Establishment and operations of SOC
Security Incident and Event Management
Data Leakage Prevention
Identity and Access Management
Privileged Identity Management
Daily security operations, monitoring and compliance
Broad general knowledge of IT environment (server, network, firewalls, end user computing).
Solid knowledge of IT security principles and best practices with knowledge in at least five( 5) of the following fields:
Operating System Security
Network Security
Cloud Security
Firewalls
IDS/IPS
Log management and analysis
Cyber security threats
SIEM correlation rule
Zero day attack and handling
IT vendor management
Project implementation
Daily IT security operations, monitoring and compliance
"Our company has never levied any fees for the recruitment process nor has it required to order tickets and accommodation through a certain travel agent or certain person"
Candidatar-se agora