Information Security Officer

Website Staff Connect Information Technology Consultants

Strategy & Planning* Participate in the planning and design of enterprise security architecture, under the direction of the IT Executive Director, where appropriate.* Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the IT Executive Director, where appropriate.* Participate in the planning and design of an enterprise business continuity plan and disaster recovery plan, under the direction of the IT Executive Director, where appropriate.* Keep current with emerging security alerts and issues.* Conduct research on emerging products, services, protocols, and standards in support of security enhancement and development efforts. Acquisition & Deployment* Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors.* Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.* Perform the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically. Operational Management* Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e. ForcePoint DLP, BoldonJames Data classification, Symantec Antivirus, Iron Port, Forcepoint Web filter, Qradar, Netwrix, F5 Wen Application Firewall, Bigfix Batch management system and RSA VPN management system) or not (e.g. workstations, servers, network devices).* Maintain operational configurations of all in-place security solutions as per the established baselines.* Main coordinator between the IT team and the MDR vendor “Paladion” to follow up, update and close all reported incidents.* Monitor all in-place security solutions for efficient and appropriate operations.* Review logs and reports of all in-place devices, whether they be under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices). Interpret the implications of that activity and devise plans for appropriate resolution.* Participate in investigations into problematic activity.* Participate in the design and execution of vulnerability assessments, penetration tests, and security audits.* Provide on-call support for end users for all in-place security solutions.* appropriate), and apply fixes, security patches, disaster recovery procedures, and any other measures required in the event of a security breach.* Download and test new security software and/or technologies.* Provide on-call security support to end-users. * College diploma or university degree in the field of computer science and/or 10 years equivalent work experience.*Broad hands-on knowledge of firewalls, intrusion detection systems, anti-virus software, data encryption, data classification, DLP, and other industry-standard techniques and practices.* In-depth technical knowledge of network, PC, and platform operating systems, including Window OS.* Working technical knowledge of current systems software, protocols, and standards, including strong knowledge of TCP/IP and network administration/protocols.* Knowledge of law enforcement practices and procedures, SETA.* Good communication skills.* Ability to conduct research into IT security issues and products as required.* Ability to present ideas in business-friendly and user-friendly language.* Highly self-motivated and directed.* Keen attention to detail.* Team-oriented and skilled in working within a collaborative environment.Certificationso CISAo CISMo CISSP

To apply for this job please visit www.naukrigulf.com.