Apply on
Key Responsibilities
Audit and Risk Management
• Perform security audits, risk assessments and analysis
• Review and participate in external audits (by the client) and prepare responses and recommendations to management
• Research attempted breaches of data security and rectify security weaknesses
• Formulate security policies and procedures
• Monitor and report on the technology threat landscape
• Assist with threat and vulnerability assessments for appropriate threat mitigation
• Identify emerging threat actors and track existing actors as their tactics, techniques and procedures evolve. Collaborate with other information security and IT team members to develop and implement innovative strategies for monitoring and preventing attacks
System Improvements
• Make recommendations for enhancing data systems security
• Pro-active asset management – management of all assets to ensure fully supported and maintained.
• Participates in technology remediation efforts through cross functional working teams and across business units
• Management of the end of life process and also the refresh of infrastructure (if required)
• Ownership of infrastructure solutions and sizing (when required)
• Assist Network management team with support and management
System Monitoring
• Conduct proactive monitoring, logging and alerting to analyze, correlate, and respond to cyber incidents
• Identify intrusion activity by leveraging available alert data
• Perform live incident response (reactive and proactive incident management) in support of IR functionality
BCP / DR
• A key participant in the Business Continuity team.
• Assist in BCP / DR planning, testing and execution particularly as it pertains to Data Security