Develop and implement security policies, procedures, and standards to ensure the confidentiality, integrity, and availability of our systems and data.
Perform security assessments and audits to identify vulnerabilities, threats, and risks to our infrastructure.
Deploy and manage security tools and technologies such as firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus software, and endpoint security solutions.
Monitor security events and alerts, investigate security incidents, and respond to security breaches in accordance with established protocols.
Manage and supervise any partner or service to ensure security and technology operational effectiveness.
Conduct regular security awareness training and education sessions for staff members to promote a culture of cybersecurity awareness.
Collaborate with cross-functional teams to integrate security best practices into system development lifecycle (SDLC) processes.
Stay up-to-date with the latest cybersecurity trends, threats, and technologies to proactively address emerging security challenges.
Provide technical documentation related to IT Security and sharing knowledge material
Minimum Qualifications
Extensive experience (3+ years) in IT security roles with a focus on network security, application security, endpoint security, security policy, and security operations.
In-depth knowledge of cyber security principles, technologies, and best practices.
Hands-on experience with security tools and technologies such as SIEM (Security Information and Event Management) systems, vulnerability scanners, and penetration testing tools.
Strong analytical and problem-solving skills with the ability to assess complex security issues and develop effective solutions
Excellent communication and interpersonal skills with the ability to effectively convey technical information to non-technical stakeholders.
Network Security: Knowledge of network security best practices, including firewalls, VPNs, intrusion detection and prevention systems (IDPS), and access control lists (ACLs).
Understanding of security protocols (e.g., SSL/TLS) and network segmentation is essential.