0% found this document useful (0 votes)
6 views

Cybersec MGR JD

Uploaded by

Vodafone 888N
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Cybersec MGR JD

Uploaded by

Vodafone 888N
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Cybersecurity Manager

• Facilitate/Assist companywide security risk assessment of information asset


• Review, recommend, approve and/or disapprove the risk mitigation plan of various
departments/divisions regarding the level of protection of information assets
• Monitor and analyze security risks for all Company initiatives and operations relative to its
defined risk limits
• Create/Develop materials for monthly Information Security Awareness bulletin.
• Create periodic security performance report for security devices and security services
• Documents and monitors deviations from security policies
• Monitoring of security-related event logs of all critical information systems and security event
logs
• Develops, updates information security standards, technology-related guidelines and
procedures in coordination with concerned groups to address updates on information security
policy
• Periodically monitors the creation, modification, and deletion of user accounts and access
rights of user accounts and access rights of users to specific information systems
• Coordinates with the network, system administrators and other security services provider to
monitor and ensure consistent security functionality across different hardware/software
platforms.
• Tests and evaluates application-based access control systems before implementation
• Monitors that only authorized software and licensed products are installed.
• In coordination with the information asset owners and system administrators, maintains the
user access matrix for all information systems and determines the appropriate access rights to
be given to Company personnel
• Performs independent technical security assessment of critical servers and network devices.
• Monitors the market for new security solutions such as firewall products, single sign-on,
encryption, password generation and secure internet working and recommends security
solutions that may be implemented.
• Researches the viability and applicability of emerging security technology and assess
vulnerabilities with emerging technologies
• Maintains current information on vulnerabilities and controls that serve as the basis for
technical controls to protect the Company against both current and emerging threats

IT Security Role

• Assist the BCP team in setting up the critical resources in the recovery site during the disaster
• Design a secure network infrastructure for the Company. Coordinates with the system
administrators in implementing the secure network design
• Updates the secure network infrastructure design based on new network components and
ensure that these new components are placed in secure segment of the Company’s network
infrastructure
• Works in consultation with the appropriate IT personnel and information asset owners to
determine which specific zone the information asset of the Company should be placed and
assist in the security solution’s implementation
• Spearhead the implementation of new security solutions

Requirement:

• ICT, Computer Science or any related field or equivalent courses


• Minimum 2 years’ experience in Information Security, IT Security, Network Security, IT Risk
Management, or related roles.
• Experience in implementing a security framework such as ISO27001, NIST, CSA, etc.
• Experience in implementing solutions and services from design, engineering through
implementation for medium to large organization
• Advance experience in monitoring and optimizing security measures to protect information
asset in cloud-based solutions setup (IaaS, PaaS, SaaS)
• Sound working knowledge in industry best practices (ISO, NIST, CSA, SANS, COBIT, ITIL) and
legislative / regulatory compliance requirement (PCI, DPA, BSP, etc.)
• Strong verbal and written communication skills and excellent analytical and technical design
skills
• Experience working in a highly collaborative and agile team environment
• Professional certification (e.g. CISSP, CISM, GSEC, etc.) is preferred.

You might also like