The Cyber Security expert is responsible for providing IT security during the development stages of software systems, networks, and data centers and is constantly looking for the vulnerabilities and risks in hardware and software.
- Assists the heads of departments and team leaders in establishing new procedures or modifying existing processes concerning information security controls when needed.
- Coordinates identification of information security vulnerabilities.
- Manages investigation of security breaches and implementation of corrective actions.
- Train the employees for awareness of information security.
- Collects and analyses information security measurements.
Makes recommendations for improvements.
- BSc in Information Technology or equivalent.
- Certifications such as CEH, OSCP, CISA, GCIH, CISSP or CASP and/or SIEM-specific training and certifications.
- Manager (CISM) or similar – an advantage.
- 4+ years of prior relevant experience.
- Advanced understanding security issues of the architecture, administration, and management of operating systems (various Linux distros, Windows, etc.), networking, and virtualization software.
- Proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, and RSA Security.
- Experience in examining a company’s security setup from a holistic view, including threat modeling, specifications, implementation, testing, and vulnerability assessment.
- Ability to manage and monitor any complex Cyberattacks and intrusions.
- Ability to strategize, plan, coordinate, and execute work activities and manage technical teams.
- Organize and coordinate technical Vulnerability Assessments, including systems and network vulnerability assessments, penetration testing, web application assessments, social engineering assessments, physical security assessments, wireless security assessments, and implementing secure infrastructure solutions.
- Previous Hands-on experience analyzing high volumes of logs, network data (e.g., NetFlow, FPC), and other attack artifacts in support of incident investigations.