Overview: This position is responsible to develop and administer risk policies and procedures of the Company.
Qualification: Masters/ Bachelors degree (16 years of equivalent education) in Business Administration (Information Systems), Computer Science or related field from HEC recognized institution.
Experience (as of last date of submission of application):
Minimum 03 years Post Qualification experience in computer systems with specialization in information security highly preferred.
Age: (as of last date of submission of application)
Maximum 40 years
Number of Vacancies : 01
Job Location : Karachi
Key Responsibilities:
- Review and implement information security policies & procedures.
- Ensure compliance of regulatory requirement and of IT Standards.
- Develop company-wide best practices for IT security, analytical reports on information security and risks using audit trails and system logs.
- Able to use IT security tools for infrastructure services and business application software assessment and its functionality.
- Review and controls in administrative activities and change management process of application software.
- Ensure capability of hardware with software for long-term benefit for the organization.
- Investigate security breaches and other cyber security incidents. Document security breaches and assess the damage they cause.
- Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.
- To perform tests and uncover network vulnerabilities. Fix detected vulnerabilities to maintain a high-security standard.
- Research security enhancements and make recommendations to management.
- Collaborates with users to discuss computer data access needs, to identify security threats and violations, and to identify and recommend needed programming or process changes.
- Develops and implements plans to safeguard digital data from accidental or unauthorized modification, destruction, or disclosure; adheres to emergency data processing needs.
- Performs risk assessments, audits, and related tests to ensure proper functioning of data processing activities and security measures.
- Safeguards system security and improves overall server and network efficiency by training users and promoting security awareness.
- Develop a security plan for best standards and practices for the company.
- Analyze network traffic, intrusion attempts, activity logs, and system alerts for trends, anomalies, and potential security breaches.
- Any other task as assigned by the supervisor
Competencies
- Experience with computer network penetration testing and techniques.
- Strong knowledge of cyber security technologies and tools. Hands-on experience with security incident and event management (SIEM) systems.
- Excellent verbal and written communication skills. Strong analytical, problem solving and decision making skills.
- Experience with network and system security protocols.
- Understanding of patch management.