Cyber Security SpecialistMy client in the financial industry is looking for a Cyber Security Specialist.The role of the Cyber Security Consultant: Operations will form part of the team which focuses on Cyber Security Operations services to businesses on the Shared Network. This team is responsible for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, and Web and Email content filtering environments. The team also manages the Data Leakage Prevention, Network Access Management, and Privileged Account Management infrastructure and processes.What will you be responsible for?On a day-to-day basis, the Consultant will be involved with the configuration, monitoring, and management of:Anti-Virus InfrastructureData Leakage Prevention system, rules, and reportsPrivileged Account Management processNetwork Access Control - process and exception handlingVulnerability Scanning, reporting, proposing remediation actions, and tracking complianceSecurity hardening baseline compliance scanning, reporting, and remediationOn an ad hoc basis, the consultant will support businesses in:Issuing, renewing, and revoking PKI digital certificates.Assessing internet and email use on request of Forensics or HR departments.Performing scheduled tasks like reviewing Firewall rule configuration and reporting.The consultant will be required to report on the status of the cyber security control environments on a weekly, monthly, and quarterly basis.The consultant will continuously consider ways to improve the effectiveness and efficiency of monitoring and response controls.The consultant will contribute to the knowledge and skills of the team by sharing lessons learned and knowledge gained through research, conferences, training courses, or interaction with experts.QualificationsMatricInformation Technology diploma or degreeInformation Security certification (preferable)ExperienceAt least 3 - 5 years in hands-on technical experience which includes:Network experience (TCP/IP, Firewalls, IPS, NAC)Anti-Virus System management and ConfigurationData Leakage Prevention tool configurationLogical Access Management (AD, PAM)Information Security Operations (Security+, CISSP will be beneficial)Vulnerability Management (use of well-known vulnerability scanning tools and interpretation of CVSS scores)Required SkillsSecurity AuditingReporting and AdministrationSecurity tools monitoring
#J-18808-Ljbffr