JOB PURPOSE:
To ensure that approved IT security policies, rules, and/or configurations are implemented across MBAL IT security systems and its Infrastructure.
To ensure that all security and/or monitoring software, computers, firewalls, servers, devices, appliances, and related IT infrastructure are up to date and configured based on existing MBAL corporate security rules, standard policies, and procedures.
Requires experience in the application of AI in cybersecurity operations such as threat detection, anomaly analysis, system monitoring, and automation.
Involves ensuring effective implementation of IT security practices within cloud environments, particularly AWS.
Understands the security context and operational specifics of the insurance industry, especially the integration and protection of the core insurance system Ebao.
KEY RESPONSIBILITIES:
- Ensures appropriate MBAL systems and/or devices are properly configured, updated, and working appropriately to detect potential threats and security incidents.
- Oversees and monitors the system security operations (cyber and internal), such as user account management, network vulnerability scanning, virus database update/scanning, and other security measures (detailed below), which are performed in accordance with existing MBAL standard policies and procedures.
Detection of anomalies, cyber threats, and fraudulent use of computers and computer systems.
Secure IT development with regard to MBAL business applications
Security electronic communication (email and social media);
Protection of personal data and privacy.
Data masking, encryption, security testing, certification, digital signatures,a nd Public Key Infrastructure
- Provides technical support and recommendations on IT security technology that would help align MBAL with the latest technology and industry standards
- Participates in the review of investigations after breaches or incidents, including impact analysis and recommendations for avoiding similar vulnerabilities.
- Performs audits, reviews, analyses, and reports on the submission of security log files as described in approved IT security policies.
- Provides support, education, and training for all employees in terms of IT Security risk awareness within the organization.