Cyber Security Operations Compliance Professional
Job Grade/Level: 9
- Five years plus years relevant work experience in IT environment, knowledge on telecommunications service provider industry and telecommunications manufacturing industry is a plus.
- Experience in the following network and security technologies, including operational & compliance aspects
- Software Whitelisting Operations
- Vulnerability Scanning and Assessments
- Log Management
- Anti-malware and anti-spam (high touch point to executives and common attack vectors).
- Network Firewall and VPN
- DLP
- Proxy Management
- NIDS/NIDP
- HIPS
- Routing and LAN switching
- Server management (Wintel and UX)
- Monitoring, logging & security event correlation techniques
- Data analytics technologies & methodologies.
- Advanced reporting techniques (e.g. PowerBI)
- Knowledge on Cloud security technologies Azure, Amazon is considered as very important plus.
- Experience in vendor technical management
- Knowledge of information security regulations: PCI, GLBA, and Safe Harbor
- Knowledge of various industry and government strategies and standards in privacy and security including ITIL, COBIT, ISO 27001, and NIST standards
- Knowledge of current and evolving Information security technologies that cover all levels of IT architecture including those that affect business processes, data, applications, and network and systems infrastructure
- Mastering Project Management skills is considered as a plus.
- Education and Certifications (exhaustive):
- Undergraduate degree in information systems or computer science.
- Advanced degree in engineering, Cybersecurity, information assurance, information security, information systems or computer science.
- National Security Administration – Department of Homeland Security certification for NTISSI/CNS standards 4011-4016 (desired).
- Certified Computer Forensics Examiner (Access Data, SANS).
- Certified Information Security Systems Professional (CISSP).
- Certified Information Systems Manager (CISM).
- Certified in Information Systems Risk Management (CRISC).
or the ability to work toward obtaining certifications.
- Customer focus
- Highly self-motivated and directed – Autonomy
- Interested in technology / security watch
- Ability to multitask
- Ability to effectively prioritize and execute tasks in a high-pressure environment.
- Be convincing – even when working with remote teams. Communication skills.
- Pro-Active – don’t wait for acting when identifying a security need