To ensure continuity of 24/7/365 security services across MTNIrancell while overseeing security event monitoring, management, and response.
To perform ongoing review and tuning of network behavior analysis to detect network threats and improve detection quality.
To ensure incident identification, assessment, quantification, reporting, communication, and mitigation while confirming SLA compliance, process adherence, and process improvement to achieve operational objectives.
To perform daily administration and maintenance of security devices under the purview of the SOC which consists of state-of-the-art technologies.
To perform threat hunting, threat management, and threat modeling, identify threat vectors, and develop use cases for security monitoring.
To gather evidence, evaluate risk, and deliver a plan to respond to contain and remove security threats as quickly and safely as possible.
To verify discovered vulnerabilities according to metrics; correlate and collate the information; apply treatment and hardening and create intelligence reports that communicate the results of the analyses to management and related stakeholders.
To build and maintain positive working relationships with stakeholders including cooperating with CRA and FATA police to meet their requirements.
To define, develop and review key security performance indicators that ensure service delivery and service improvements.
To tune and health check sandbox solution for detection of state-of-art and zero-day malware.
To implement and continually improve digital forensics capability, tools, and processes.
To develop and revise processes to strengthen the current security operations framework, review policies and highlight the challenges.
To educate ITS/NWG/ICS on the importance of security monitoring and the need for improvement in log collections.
Requirements
Bachelor’s degree in Technology Systems (Information Technology, Computer Engineering, Information Security) or related disciplines.
At least 5 years of experience in cyber security areas.
Experience working in a medium to large organization.
Experience with log analysis tools, creating parsers, correlation rules and managing reports and dashboards.
Experience in developing, documenting, and maintaining security procedures and playbooks.