● Collaborates with users to discuss computer data access needs, identify security threats and violations, and identify and recommend needed programming or process changes.
● Uses data encryption, firewalls, and other appropriate security tools and applications to conceal and protect transfers of confidential digital information.
● Develops and implements plans to safeguard digital data from accidental or unauthorized modification, destruction, or disclosure; adheres to emergency data processing needs.
● Reviews violations of security procedures; provides training to ensure violations do not recur.
● Monitors and restricts access to sensitive, confidential, or other high-security data.
● Modifies security files and applications as able and necessary to provide specialized access, allow new software to be installed or integrated, or correct errors.
● Performs risk assessments, audits, and tests to ensure the proper functioning of data processing activities and security measures.
● Safeguards system security and improves overall server and network efficiency by training users and promoting security awareness.
● Determines when to update virus protection systems by monitoring current reports of computer viruses; facilitates or performs needed updates.
● Performs other related duties as assigned.
Requirements
● Minimum Bachelor's degree in Computer Engineering or IT.
● Master in the security concepts of software and servers and security standards.
● Knowledge of the basics of information security management systems (ISMS).
● Awareness of (CEH) concepts of security assessment and penetration testing.
● Knowledge of standard and audit of information security management system ISO (27001).
● Familiarity with the concepts and principles of passive defense.
● Ability to analyze network security risks such as viruses or hacker attacks.
● Familiarity with network management topics.
● Familiarity with the concepts and principles of electronic protection systems.
● Ability to set up and manage services.
● Master in the basics of security monitoring.
● Mastering the principles of security in the software production cycle.
● Have network security knowledge to protect against intrusion.
● Familiarity with database concepts.