Review and recommend IT security solutions, configurations, Compliance with standards, Continuous monitoring, Review and recommend systems, server configurations in line with CIS standards. Implementing policies, procedures, and compliance. Monitor end points, internal and external threats by designing broad defenses. Maintain documentation of security guidelines, procedures, standards, and controls.
Implementing CIS standard procedures and policies
Continuous monitoring/improvements for IT security measures
Collect data on current security measures for risk analysis and write systems status reports regularly.
Conduct testing to identify vulnerabilities and collaborate with cybersecurity team to update defensive protocols when necessary.
Configure antivirus systems, firewalls, data centers, and software updates with a security-first mindset.
Grant credentials to authorized users, monitor access-related activities, and check for unregistered information changes.
Lead employee training on cyber threats.
Deep knowledge of IT, including hardware, software, and networks
Meticulous eye for detail and an ability to multitask in a fast-paced environment