The Cyber Defense team's mission is to deliver a highly effective end-to-end 24x7 Cyber Defense service.
They are responsible for proactively identifying threats and vulnerabilities; detecting and mitigating cyber events; and managing cyber security incident responses to minimize service impact and provide a secure digital future for our customers.
Brief Description
Coordinate operations of the Cyber Security Defense stakeholders and team.
Implement, upgrade, maintain, and refine end-to-end security monitoring.
Facilitate implementation, management, and optimization of Cyber Defense policies, standards, and procedures.
Ensure adequate CAPEX/OPEX budget, resource, and management focus is on cyber security risks.
Implement actions to close risks, and conduct audits & reviews (internal and external) on security monitoring and incident management.
Improve the cyber security posture of the company through several initiatives, including but not limited to Cyber Security Baselines.
Key Roles:
Impact on the Business
Coordinate optimization of the operational & monitoring defense cyber security baselines (CSB) controls across all relevant business areas and processes.
Optimize and maintain respective monitoring cyber security controls and requirements across all environments.
Responsible for the set-up, execution, and maintenance of the security incident management and coordination process in conjunction with incident management capabilities.
Support all internal and external audits around technology systems and processes, ensuring these systems are free from known technology audit findings and that all audit findings in these systems are closed within agreed timelines.
Qualifications
Degree in Electrical Engineering, Computer Science, Information Technology, or equivalent technology-related degree.
At least one professional Information Security Qualification: CISSP/CISM/CISA.
Advanced competencies in Network Security: CCNP or CCIE (Security).
Advanced competencies in Microsoft, Linux, or Unix Operating Systems administration.
Advanced competencies and experience in Information Security Technologies.
Skills and Experience
Minimum of 3 years focused security experience in Incident Management, Intrusion Analysis, Network Troubleshooting, or Reverse Engineering.
Minimum of 2 years security tooling management and deployment experience with forensic tools, security logging, and EDR tooling.
Experience in design, delivery, and support of Information Security solutions to customers will be an added advantage.
Good communication skills and a team player.
Experience in the use of security tools.
Project management skills and proven task execution (getting things done).
Superior report writing skills.
Analytical thinking.
Other Roles:
Customers, Suppliers, and Third Parties
Support compliance with legal, regulatory, and key stakeholders' requirements across the technology domains.
Responsible for monitoring compliance of the cyber security monitoring and incident services contract to ensure it is within agreed SLA.
Coordination of analytical processes and incident response measures.
Ensure proper monitoring implementation and change management processes compliance for all planned and emergency changes in technology systems.
Leadership, Planning, and Human Resource Management
Manage assigned cyber security CAPEX/OPEX budgets and planning, in alignment with the company and group strategy.
Manage the cyber security subordinate resources (FTEs and contractors) for effective implementation of their tasks/job descriptions.
Skills development within the cyber security department.
Performance management of the cyber security team.
Provide input to security policies and requirements on technology security methods and technologies.
Provide regular and accurate management reporting on cyber security service performance.
Innovation and Change
Maintain the incident management & monitoring (SPDA) processes of the GDPR and business requirements.
Continually review and enforce security policies and controls to support business requirements and changing security landscapes.
Set up analytics framework and tools.
Drive continuous improvement through simplification of key cyber security processes.
Communication
Drive internal and third-party service review meetings covering performance, service improvements, quality, and processes.
Make recommendations for cyber security service improvement.
Plan and ensure actions are followed through to completion in a timely manner.
Support information security awareness and training for all users and third-party vendors.
Drive incident planned and emergency communication processes to both internal and external audiences.