To monitor, analyze and respond to IT security related events, to design and implement security controls in the IT-environment, to participate in IT security related assessments and to resolve IT security problems to ensure that the continuity and efficiency of the IT-infrastructure meets the requirements of the organization to protect the confidentiality, integrity, availability, and privacy..
Areas of Responsibility / Tasks
Performance must reflect appropriate level of expertise and achievement of the desired results for the items listed below.
General Policy
Ensuring build-in security during the development stages of software systems, networks, and data centers.
Monitoring hardware and software for vulnerabilities and risks
Constantly monitoring security events, incidents, and intrusions to identify breaches in time and communicate them to the IT team
Responding to potential threats or breaches by addressing security vulnerabilities
Analyzing IT specifications to assess security risks
Designing and implementing security related controls
Serving as a security expert and conducting training when needed
Drafting policies and guidelines
Participating in Audits, Risk Assessments, and relevant activities
Investigate the IT environment in a proactive and discerning way to make the necessary proposals for improvement in time
Liaising with vendors to implement security solutions
Stay well-informed about the evolutions within the specific field, keep his/her knowledge up to date within the context of new developments to strengthen his/her credibility by offering a service that is continuously based on updated knowledge.