Roles and Responsibilities


Role: Effectively protect organizations' digital assets and prevent security breaches by identifying threats and vulnerabilities in systems/ network/ software. Developing and implementing high-tech solutions to defend from hacking, malware and ransomware, insider threats, and all types of cybercrime.



Principle Accountability:

  • Protect organizations' digital assets and prevent security breaches by identifying threats and vulnerabilities in systems/ network/ software.
  • Developing and implementing high-tech solutions to defend from hacking, malware and ransomware, insider threats and all types of cybercrime.

Job Responsibilities:

  • Continuously assess, test, improve and document Security activities and create reports highlighting the IT security issues, gaps, concerns, criticalities and co-ordinate security incidents with the Team, Subject Matter Experts (SMEs) and Security Leader.
  • Safeguard organization Informations as per Information Security Management System (ISMS) protocols.
  • Implement and maintain the Information Security Management System and policies, standards, procedures and guidelines.
  • Perform IT compliance monitoring and improvement activities to ensure compliance both with internal security policies etc. and applicable laws and regulations.
  • Conduct information security awareness campaigns.
  • Participate and support information security risk assessments and control selection activities and information security audit activities.
  • Participate and support contingency planning, business continuity management and IT disaster recovery in conjunction with relevant functions and third parties.
  • Asses the network, system with the vulnerability scanner and highlight the vulnerability and conduct the risk assessment.
  • Consult with the next generation solution to up to date with the IT standard and compliance
  • Experience in the ISO 27001 compliance requirement and must have Experience in auditing of organization network
  • Experience in the SIEM, SOAR, EDR, Firewall, Network Security, MFA, Exchange, Data Security, Web Security
  • Comply with IT Policies (Governance and IT Security) and all applicable system and security controls, clauses and laws.
  • Report any Information Security incidents in a timely manner and action them as per management directions.

Desired Candidate Profile

  • Bsc. Computer, Bachelor of Technology/Engineering(Computers, Other Engineering)
  • Cisco certification (CCNA, CCNP, CCDA)/ Microsoft Certification (MCSA, MCSE), CEH
    Good to have Regulatory Compliance auditing knowledge, CISSP, Linux OS Knowledge, OSCP, OSCE, Database Knowledge

Perks and Benefits


Medical Insurance, Yearly Airfare allowance



Email: careers@westernint.com

Post a Comment

 
Top