Skills and Competencies Required:
- Knowledge of operating systems
- Knowledge of core networking
- Knowledge of cloud computing and security
- Hand on configuring security devices and application (firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering)
- Experience of monitoring tools and capability to setup alert on all security devices and application
- Experience on cloud platforms and it security architecture
- Ability to monitor and take the appropriate action on any security incident/ alert Ability to submit analytical report based on alert
- Knowledge of scripting, PowerShell
- Auditing firewall rules and correcting the gaps identified
- Experience in VAPT and knowledge on tools such as Nessus, NMAP
- Experience on Kali Linux
Duties & Responsibilities
- Ability to threat analysis and investigation.
- Active threat hunting and adversary tracking.
- Strong knowledge of Network such as LAN, VLAN, WAN, SDWAN
- Strong knowledge of operating systems such as Windows, Linux, and MAC
- Ability to configure monitor for security devices E.g., firewalls, antivirus
- Identify and define system security requirements
- Ability to design computer security architecture and helping for implement Prepare and document standard operating procedures
- Configure and troubleshoot security infrastructure devices
- Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks
- Ensure that the company knows as much as possible, as quickly as possible about security incidents
- Write comprehensive reports including assessment-based findings, outcomes, and propositions for further system security enhancement
- Understanding of ISMS (ISO 27001) its controls and processes
- Experience in managing active directory and implementation of group policies
- Experience in VAPT and knowledge on tools such as Nessus, NMAP Experience on kali Linux
Education & Training
- Bachelor’s Degree in Computer Science or related field.
- Certified Ethical Hacker from EC-Council or equal certification from other international certification body
- Certified on Microsoft Azure and AWS will be added plus
Knowledge & Experience
- 5 – 7 years of experience in IT support and 4 -5 years of experience in cyber security