Cyber Security Consultant: Operations
The role of the Cyber Security Consultant: Operations will form part of the team which focuses on Cyber Security Operations services to businesses on the Shared Network. This team is responsible for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, Web and Email content filtering environments. The team also manages the Data Leakage Prevention, Network Access Management and Privileged Account Management infrastructure and processes.
Duties & Responsibilities
On a day-to-day basis the Consultant will be involved with the configuration, monitoring and management of:
- Data Leakage Prevention system, rules and reports
- Privileged Account Management process
- Network Access Control process and exception handling
- Vulnerability Scanning, reporting, proposing remediation actions and tracking compliance
- Security hardening baseline compliance scanning, reporting and remediation
On an ad hoc basis the consultant will support businesses in:
- Issuing, renewing and revoking PKI digital certificates.
- Assessing internet and email use on request of Forensics or HR departments.
- Performing scheduled tasks like review Firewall rule configuration and report.
- Reporting on the status of the cyber security control environments on a weekly, monthly and quarterly basis.
- Considering ways to improve the effectiveness and efficiency of monitoring and response controls.
- Contributing to Knowledge and Skills of the team by sharing lessons learned and knowledge gained through research, conferences, training courses or through interaction with experts.
Desired Experience & Qualification
Qualifications
- Matric
- Information Technology diploma or degree
- Information Security certification (preferable)
Experience
At least 3 – 5 years in hands-on technical experience which includes:
- Network experience (TCP/IP, Firewalls, IPS, NAC)
- Anti-Virus System management and Configuration
- Data Leakage Prevention tool configuration
- Logical Access Management (AD, PAM)
- Information Security Operations (Security+, CISSP will be beneficial)
- Vulnerability Management (use of well-known vulnerability scanning tools and interpretation of CVSS scores)
Knowledge and Skills
- Security Auditing
- Reporting and Administration
- Security tools monitoring
Personal Attributes
- Interpersonal savvy
- Decision quality
- Plans and aligns
- Optimises work processes
Core Competencies
- Cultivates innovation
- Customer focus
- Drives results
- Collaborates
- Being resilient
Package & Remuneration
Competitive CTC with benefits.
#J-18808-Ljbffr