Job Description:
- Develop strategies to respond and to recover from a security breach
- Understanding of security and IT products and help IT team to create baseline to architect ecosystem
- Understanding an Installation and use of firewalls, data encryption and other security products and procedures
- Act as gatekeeper, for business change management and device enrollment process
- Conduct periodic penetration test to know infrastructure/system vulnerability/weakness then follow-up till closure
- Monitor networks and systems for security breaches, through the use of software or manually that detects intrusions and anomalous system behavior
- Ensure ecosystem computer health and compliance are meeting for the business like patch, AV, Privilege access
- Ability to communicate peers and management on violation /breach of policy
- Assess Information security risk periodically and Conduct every month information risk management meeting to discuss open and close items
Technology experience:
- Expertise in anti-virus software, intrusion detection, firewalls and content filtering
- Knowledge of risk assessment tools, technologies and methods
- Expertise in designing secure networks, systems and application architectures
- Disaster recovery, computer forensic tools, technologies and methods
- Planning, researching and developing security policies, standards and procedures
- System administration, supporting multiple platforms and applications
- Data loss protection and prevention tool
- Operational knowledge of various OS, Web and Database penetration tool
Learn more about our Risk Advisory Services.