· Masters / 4 years Bachelors in Information Security / Computer Science / Information Technology / Project Management / Business Administration from some reputed foreign or HEC-recognized institution / university.
· Professional security management certification like ISO 27001, CISSP, CISM, CEH, CISA, COBIT, CompTIA Security+.
· Candidate must have 3+ years of experience in providing technical assistance and expertise in developing, accrediting, and deploying security components protecting against inside and external threats related to Security Operation Center (SOC).
· Excellent communication skills both verbal & written.
· Ability to work in a team environment & learn new technologies.
· Experience in looking after 24×7 environments
Responsibilities:
· Implement information/cyber/network securities and network safety processes in operations to secure network of the organization.
· Implement Protections by Installing and making use of software, such as firewalls and data encryption programs, to protect organizations’ sensitive information.
· Minimize the risk of damage from security breaches by putting a business continuity or disaster recovery plan in place.
· Test/assess Vulnerabilities by conducting periodic scans of networks to find any vulnerability, also conducting penetration testing, in which they simulate an attack on the system to highlight or find any weaknesses that might be exploited by a malicious party.
· Constant monitoring of organization’s networks and systems for security breaches or intrusions and usage to ensure compliance with security policies.
· Identify internal & external threats and determine risks and mitigate them.
· In Case of a Security Breach, leads incident response activities to minimize the impact of a Security Breach. Technical and forensic investigation into how the breach happened and the extent of the damage.
· Update anti-virus software and monitor employee access levels. When employees leave a company or change positions, officers must ensure that they remove or update access privileges.
· Keeping up to date with developments in IT security standards and threats.
· Collaborating with management and the IT department to improve security.
· Educating colleagues about security software and best practices for information security
· Documenting any security breaches and assessing their damage.
· Any task assigned by management.