Lead the engineering and implementation and maintenance of security tools, solutions, processes, and policies to ensure an acceptable level of security and further improvements, including vulnerability management, wireless and wired network intrusion detection, end point protection, host intrusion detection, firewall, baseline compliance and monitoring, security incident and event management
Support security systems deployment, management and maintenance, including Firewalls, VPN, UEBA, DLP, End Point, Access control, Mail protection systems
Develop technical solutions and new security tools to mitigate security vulnerabilities and automates repeatable tasks
Provide computer security incident prevention, reporting, and analysis support with technical expertise regarding information security vulnerabilities and solutions.
Disaster recovery services : Assists in the design, development and implementation of necessary disaster recovery services. Supports the daily operational components of all disaster recovery services to confirm the smooth operation of all hardware and software throughout the environment.
Applies superior troubleshooting skills on all helpdesk services received from Tier 1 and Tier 2 technicians, in a timely fashion and supports all IT user request and repairs that are issued to end users.
Liaise and maintain a working relationship with security vendors in order to stay informed of new technologies.
Provide computer security incident prevention, reporting, and analysis support with technical expertise regarding information security vulnerabilities and solutions.
Automate reporting processes and data aggregation where appropriate
Provide high level support and technical support on network architecture, authentication practices and security administration
Solve security project problems
Qualifications
University degree in Computer Science or equivalent education
Certification such as CISSP, CCSP, CCNA Security is an asset
5 – 7 years of experience in security operations, incident response, vulnerability assessments and security architecture design