Job Summary
We are seeking a dedicated and skilled Cyber Security Specialist to join our dynamic team on a part-time basis, with potential to convert to a full-time role. The ideal candidate will be responsible for protecting our and client’s information systems and ensuring the integrity, confidentiality, and availability of data. This role requires a strong understanding of various security technologies and practices, as well as the ability to respond effectively to incidents and vulnerabilities.
Responsibilities
- Implement and maintain security measures to safeguard information systems against unauthorized access, breaches, and other cyber threats.
- Conduct regular security assessments, vulnerability research, and penetration testing to identify weaknesses in the network infrastructure.
- Monitor security alerts and incidents using SIEM tools such as Splunk, SolarWinds, or similar technologies.
- Develop and enforce policies related to information security, including compliance with ISO 27001 and ISO 27002 standards.
- Manage identity & access management systems to ensure proper authentication and authorization protocols are followed.
- Collaborate with IT teams on network engineering tasks, including firewall configurations, routing protocols (BGP, OSPF), and VPN setups.
- Respond to security incidents by conducting thorough investigations and implementing incident response plans.
- Maintain knowledge of current cybersecurity trends, threats, and best practices in areas such as cloud computing (AWS, Azure), virtualization (VMware), and operating systems (Windows, Linux).
- Provide training and support for staff on security awareness and best practices.
- Fortinet Expertise : NGFW, SASE, SD-WAN, FortiAnalyzer, FortiManager
- Microsoft Security : Sentinel, Defender XDR, Entra ID, Purview
- SOC operations & SIEM tuning
- Threat hunting & incident response
- Zero Trust architecture
- Security automation & compliance frameworks (ISO 27001, NIST, PCI DSS)
Experience
Bachelor's degree in Computer Science or a related field is preferred.Proven experience in cybersecurity roles with a focus on system security, network security, or information security.Familiarity with various operating systems including Solaris, CentOS, macOS, Android, iOS, and Windows.Hands-on experience with network protocols (TCP / IP), encryption methods, load balancing techniques, and disaster recovery planning.Proficiency in scripting languages such as Python or Bash (Unix shell) for automation tasks.Understanding of computer forensics principles and incident response methodologies.Experience with network management tools for monitoring infrastructure performance.#J-18808-Ljbffr