Overview
Skills
Job Details
Key Responsibilities
1. Security Monitoring & Incident Response
Monitor security events and alerts using SIEM and other security tools.
Investigate potential security incidents, contain threats, and support remediation.
Perform forensic analysis and prepare incident reports.
Coordinate with IT teams to ensure timely incident response.
2. Vulnerability & Risk Management
Perform regular vulnerability scans and assessments.
Track, analyze, and report security findings; support remediation efforts.
Assist in conducting risk assessments and security audits.
Prioritize security improvements based on risk impact.
3. Security Operations
Manage and maintain firewalls, IDS/IPS, endpoint protection, and other security technologies.
Ensure access controls and identity management processes are implemented correctly.
Review system logs for abnormal activity and potential threats.
4. Policy, Compliance & Governance
Develop, implement, and maintain security policies, standards, and procedures.
Support compliance initiatives (ISO 27001, SOC 2, PCI-DSS, HIPAA, GDPR, etc.).
Conduct security awareness training and promote a strong security culture.
5. Project & Architecture Support
Assist in designing and implementing security improvements for new and existing systems.
Conduct security reviews of applications, networks, and third-party vendors.
Provide security requirements and guidance during IT projects.
Required Skills & Qualifications
Bachelor s degree in Computer Science, Information Security, or related field (or equivalent experience).
2 5+ years of experience in cybersecurity, IT security, or related roles.
Strong understanding of networks, operating systems, and security principles.
Hands-on experience with security tools: SIEM (e.g., Splunk), EDR/XDR, firewalls, IDS/IPS, vulnerability scanners.
Knowledge of frameworks such as NIST, CIS Controls, ISO 27001.
Familiarity with scripting (Python, PowerShell) is a plus.
Excellent analytical, communication, and problem-solving skills.
Preferred Certifications
CompTIA Security+
Certified Ethical Hacker (CEH)
GIAC (GSEC, GCIA, GMON)
CISSP Associate or CISSP
Microsoft or cloud security certifications (AZ-500, AWS Security Specialty, etc.)