IT Security TechnicianWe currently have an opportunity for an IT Security Technician. This position requires a variety of specialised skills and applied patience. A security technician has a single place to work from; however, is required to support multiple, different, and forever changing environments. Communication (both verbally and written) needs to be excellent, empathy, and the ability to manage expectations effectively are sought after characteristics. This function is 'fast paced' and often measured on the ability of an individual to work within a growing team of varied skill sets. A successful security technician will be well versed in the overall Microsoft Security stack; however, in transition of technology, a sound knowledge of third party Security Protocols and applications is necessary.Duties & ResponsibilitiesGeneral Security Checks (these checks occur daily and include):Microsoft 365 Defender to monitor the security of Endpoint and remediate if needed.McAfee database daily report analysed.Forticloud to monitor traffic coming through our firewall.Review IPS report daily.Microsoft Intune to check device compliance and clean up stale devices on O365.Rapid 7 to check on vulnerabilities on our servers.Patching and Server AdministrationDaily the Rapid7 dashboard is checked for any vulnerabilities which are then patched. These include software updates, registry edits, and the configurations of the servers' settings.Servers are also rebooted after hours throughout the week, and every Sunday the LMS servers are rebooted as they are required to be up during the week.N-Able Patch ManagementMonthly Auto-patching takes place, where monthly Windows updates are pushed to our servers.This includes manually approving updates for each server.Maintenance of the N-Able server is done on a weekly basis, ensuring all our servers are reporting back to the N-Able servers and making sure all client connectors are operational.Identity and Access ManagementCreate VPN accounts and domain accounts and issue credentials to the users.Modify or remove user's access or rights on our network.Keep an accurate register of all external users with access to our network; this register is modified on a daily-weekly basis.Creation of accounts on Osirium PAM solution.Assists users with issues regarding access to VPN.DocumentationCompilation of company security policies and standard operating procedures.Understanding CIS 18 Controls and reporting on.Desired Experience & QualificationApplicable tertiary qualification in Information Systems.Excellent telephone manner and written communication.Excellent attention to detail.Ability to manage end-user frustrations effectively and exercise the patience needed to communicate to end-users who may often be unhappy (without face-to-face interaction).Ability to follow predefined procedures and escalate timeously to the Security Manager where required.Ability to meet deadlines and complete daily tasks within SLA timeframes.Ability to use knowledge base resources to resolve problems.Good attitude towards work and colleagues.Consistent, prompt delivery of often common or repetitive tasks.Punctuality when keeping appointments and awareness of written tone.Knowledge of Information Security Governance.Knowledge of Vulnerability and Risk Management.Information Security and Design.Understanding Anti-Virus software and Intrusion Detection Systems.
#J-18808-Ljbffr