Job Summary
Qualifications and Experience Bachelors Degree/ Advanced Diploma in Information Technology related qualification. Certifications such as Security +, CISSP\ CEH\ Cybersecurity Practitioner Certification are advantageous. Relevant 4 years experience in an ICT Security related environment. Experience in developing, documenting and maintaining security procedures. Key Performance Areas Create and Manage Documented Standards, Processes and Procedures Ensure compliance with ICT security standards, processes, and procedures for both systems and applications. Develop and update necessary documentation to support system and application security measures. Security Solutions Implementation and Maintenance Develop and implement security procedures, and standards to safeguard company assets and data. Manage and administer common security tools such as Data Loss Prevention (DLP), Antivirus software, and Cloud Security Tools like Cloud Access Security Broker (CASB). Conduct regular security assessments and audits to identify vulnerabilities and assess the effectiveness of existing security controls. Collaborate with IT teams to design and implement security measures for new systems and applications. Provide guidance and support to internal teams on security-related matters, including incident response and security awareness training. Security Monitoring Monitors networks and analyses intrusions using various tools like Intrusion Detection/ Prevention Systems (IDS/ IPS), firewalls, and Host-Based Security System (HBSS). Identifies unauthorized usage trends by correlating network activity across different networks. Reviews alerts and sensor data, then compiles technical incident reports. Conducts pre-implementation testing on new computers, software, switch hardware, and routers to ensure security. Assists in developing business continuity/disaster recovery plans, conducts disaster recovery tests, publishes results, and implements necessary changes to address any deficiencies. 2nd Level Support on Cybersecurity Incidents Responds and resolves reported security incidents Monitors system logs from the SIEM and other network traffic for unusual or suspicious activities. Interprets such activity and makes recommendations or escalate for resolution Collates security incident and event data to produce monthly exception and management reports. Implement Security Controls Across Applicable Systems and Networks Verifying all requests and changes are correctly authorized before implementation. Participate in identifying potential security violations, segregation of duties and risks prior to and post implementation of controls. Operate and administer ICT security control solutions to ensure that systems and applications are protected against security threats and vulnerabilities. ICT Security Awareness Participate and assist with the development of Information Security awareness programs within the organization. Handle enquiries relating to ICT security and escalate where you are unable to assist. Monitoring, Reviewing and Reporting on ICT Security Participate with all monitoring, reviewing and reporting activities for systems and applications under your control. Participate in defining and implementing processes and procedures to ensure monitoring, reviewing and reporting activities are performed as agreed. Provide recommendations for appropriate security control improvements, introduction of new security controls. Auditable Record Keeping Participate and assist with defining and implementing processes and procedures to ensure that auditable records are kept for all security activities for which the teams are responsible. Participate and assist in maintaining all records. Reporting Track and report against set objectives and targets. Report on emerging risks. Provide ad hoc reports on process improvement initiatives. Stakeholder Management Maintain healthy relationships with all stakeholders. Follow up and resolve all queries, follow up and making recommendations on which corrective actions are appropriate. Follow up and feedback to all stakeholders to keep them updated on the status of a query. Audit Recommendation Analysis and Implementation Participate and assist in defining and implementing processes and procedures to ensure that audit recommendations are: analysed before implementation thereof. are properly authorised and implemented within the time schedules agreed. Assist in implementing recommended changes as per audit Participate and assist in reporting the status of recommendation analysis and implementation regularly to management.