Position summary:
Responsible for performing security audits, risk assessments, and analysis. This also includes making recommendations for enhancing security for all IT systems, researching attempted breaches of IT security, rectifying security weakness and recommending improvements. This individual will also be required to formulate security policies and procedures. They will be responsible for ensuring the stability, integrity, and efficient operation of the organizations overall IT security. This individual will also play a role in planning, designing, and implementing new IT security related projects and initiatives as well as take a security advisory role in other IT projects when assisting Infrastructure team.
Essential functions:
Identifies areas of risk in our and third-party systems that may lead to the possibility of being attacked or harmed and classifies these risks based on a wide variety of criteria such as risk ratings, criticality, availability of exploit code, ease of exploitation, results of a successful exploitation, required expertise etc.
Identifies areas of risk in our and third-party systems that may lead to the possibility of being attacked or harmed and classifies these risks based on a wide variety of criteria such as risk ratings, criticality, availability of exploit code, ease of exploitation, results of a successful exploitation, required expertise etc.
Any combination of one or more of the following professional designations is preferred: CEH, GSEC, OSCP, CCNP Security, Security+, CISSP
Knowledge of TCP/IP, encryption fundamentals, firewall/VPN/IPS systems, vulnerability management, mobile device management, etc.