Operational security
Monitor end- point security controls.
Conduct all IT security controls effectively
Review and approve all Firewall changes and ensure that only appropriate access is granted when required and in line with Firewall Approval Guidelines.
Support to revise Business Continuity Plan and Disaster Recovery Manager during Disaster Recovery exercises.
Review of critical systems’ security logs and identify suspicious/abnormal events of the systems.
Monitor all mandatory security penetration tests and internal vulnerabilities and follow up on all remediation.
Conduct regular user access management activities.
Reviews of security configurations of key systems against regional baselines and identifying gaps to fix.
Control Privileged IDs and the release for usage.
Review IT security patch management.
Functional level
Addresses the security data processing facilities/operations, risk management audits and compliance with established policies.
Develops, implements and maintains IT security program to Supports Company, and administrative use IT resources.
Establishing security policies to access to information system, user rights and privileges to applications, system security utilities.
Designing programs, policies and procedures to ensure continuous improvement of IT services and maintain the integrity of systems.
Support on- going management, internal testing and remediation to ensure sustainability with IT compliance.
Ownership of security incident responses, investigations, and support in any emergency situations with remediation.
Monitors the changes in guidelines and support the tactical adoption of IT governance strategies.
Plans, coordinates and directs staff in the quality assurance program for organization.
Participates in design and capacity planning for new products and technologies associated with information security.
Educates, advises and trains users to ensure the security of the company&039;s networks, systems and data.
Develops/maintains policies and procedures surrounding IT risk assessment, IT security, and IT Disaster Recovery through close partnerships.
Assists with projects concerning the evaluation and implementation of security- related technologies.
Support to alignment of technology stacks across the company.