OVERALL PURPOSE OF THE JOB
Responsible for implementing managing and maintaining the security measures that protect the organizations ICT systems and infrastructure.
Security System Management
- Configure manage and monitor security tools including firewalls antivirus software intrusion detection/prevention systems and encryption tools.
- Regularly update and patch security systems to protect against vulnerabilities.
- Monitor network traffic and system logs for unusual activity identifying and responding to potential security breaches.
Access Control and User Management
- Manage user access controls ensuring that only authorized personnel have access to specific systems and data.
- Regularly review and update user permissions in accordance with organizational policies.
- Implement multi-factor authentication and other security measures to protect sensitive information.
Incident Response
- Respond to security incidents working to contain and remediate issues as quickly as possible.
- Document security incidents and assist in the investigation process.
- Collaborate with other IT and security teams to analyze and resolve security incidents.
Security Audits and Compliance
- Conduct regular security audits to ensure compliance with organizational policies and industry standards.
- Assist in the preparation and execution of internal and external security audits.
- Maintain detailed records of security activities and compliance status.
Security Awareness and Training
- Assist in the development and delivery of security awareness training programs for staff.
- Provide guidance and support to users on best practices for maintaining security.
Vulnerability Management
- Perform regular vulnerability assessments and penetration tests to identify security weaknesses.
- Work with the ICT team to remediate vulnerabilities and improve security controls.
Documentation and Reporting
- Maintain detailed documentation of security configurations procedures and incidents.
- Prepare regular security reports for management highlighting key risks and mitigation efforts.