Participate in the development and management of the implementation of specific cybersecurity policies and procedures
Ensure proper integration of cybersecurity in IT-related projects; this includes ensuring security aspects are considered and changes to systems are controlled.
Ensure proper information systems and information processing facilities protection, this includes but is not limited to defining a list of authorized software and version that is needed
Ensure proper email protection and the use of email filters to block phishing emails, restrict downloads of dangerous content unnecessary for business, and scan emails for malware.
Ensure proper mobile device security through separation and encryption of the organization's data and information stored on mobile devices and BYODs.
Ensure proper data and information protection by reviewing classification schemes, defining standards for labeling information assets, defining rules for sharing sensitive information, etc.
Ensure proper vulnerability management activities are conducted, which includes performing regular authenticated vulnerability scans on systems, reviewing vulnerability ranking, etc., and take corrective actions as necessary.
Maintain cybersecurity event log sheet and monitor events as necessary. This includes ensuring systems produce event logs that could help detect, understand, prevent, or recover from attacks and incidents.
Conduct cybersecurity incident and threat management activities, which include, activating the incident response procedures when an incident or threat is detected, and defining management responsibilities and procedures to ensure a quick, effective, and orderly response to security incidents or threats.
Ensure proper physical security for sensitive information, this includes ensuring secure disposal of sensitive information on media and systems no longer required, being reused, or being sent to a third party for maintenance.
Participate in the development the cybersecurity solutions.
Conduct any other cybersecurity activities as indicated by the relevant regulatory requirements and global standards, for example, web applicat ion security, third-party cybersecurity, and cloud computing and hosting cybersecurity management
Job Requirements
Minimum Qualifications:
Bachelor's Degree in Information Technology.
IT security certifications such as Security+, CEH,etc.
Experience:
4 Years of Experience.
Wide range of practical experience within own discipline
Job-Specific Skills:
Detailed understanding of appropriate processes and procedures
Effective management and control of on-the-job expenditure and/or allocated budgets
Ability to persuade others based on factual evidence to support a line of reasoning.