Epicareer Might not Working Properly
Learn More

IT Security Officer

Salary undisclosed

Apply on


Original
Simplified

Job Requirement:

  • Candidate must possess at least Bachelor's Degree in Engineering (Computer/Telecommunication) or equivalent.
  • At least 2 Year(s) of working experience in the related field is required for this position.
  • Preferably Staff (non-management & non-supervisor) specialized in IT/Computer - Software or equivalent.
  • Required Skill(s): OSI LAYER, TCP/IP, OWAPS, CVE.
  • Strong understanding about Network Security, Networks Architecture, Protocols, and related technologies.
  • Having CEH, OSCP, CISSP or other IT related certificates is an advantage.
  • Deep knowledge about Operating System Security and such as Windows, Linux and UNIX and Database Security with suitable security configuration.
  • Expertise in analysis and handling of security vulnerabilities as well as experience in implementing remedial measures.
  • Experience in Information Security or Network Security, related to Penetration Testing, Security analysis, Vulnerability Assessment or Security Management.
  • Experience in identifying, analyzing and responding to security incidents.
  • An understanding of security frameworks such as ISO 27001 or NIST.
  • Good skills in oral and written communication to interact effectively with various stakeholders.
  • Ability to work collaboratively with IT and business teams to identify and address security issues.
  • Strong analytical skills to analyze security threats, identify vulnerabilities and design effective security solutions.
  • Understanding of Cloud Architecture, especially in the area of Cloud Security.
  • Knowledge of CICD Pipeline, Kubernetes and several programming languages such as PHP, Golang, Java, Python, Bash is a plus.
  • Knowledge of Agile SSDLC (Secure Software Development Lifecycle).
  • Proficiency in tools like SIEM systems, vulnerability scanners, and endpoint protection solutions
  • Cloud security (AWS, Azure, Google Cloud, Ali Cloud).
  • Incident response and penetration testing.

Job Description:

  • Manage Security Infrastructure & Implementation Policy.
  • Monitoring Suspicious & Anomalous Transaction.
  • Business Continuity Plan/Disaster Recovery Plan.
  • Analyze need security systems and networks company.
  • Design and appropriate implement policy security, including security network arrangement, and security system operation settings.
  • Ensure best practices in develop secure application.
  • Monitoring systems and networks actively to detect and respond threat using security monitoring tool and intrusion systems detection.
  • Finish security incident with fast and appropriate step of remediation.
  • Conducting a security audit to identify vulnerability in IT infrastructure.
  • Evaluate systems and applications to identify security gap and provide recommendation for troubleshoot.
  • Manage and maintain security system, including software updates, security patches, and proper configuration.
  • Manage users access and roles, as well as enforce tight policy security.
  • Investigate incident security and do forensics analysis or identify cause and effect.
  • Responding and self recovering from security attack, including data recovery, system recovery, and repair exploited vulnerability.
  • Monitoring latest security trend and development technology to ensure effective protection from new threat.
  • Do continous repair regarding to infrastructure security and implement necessary updates related to policies and security practices.
  • Documenting and defining policy corporate data security.
  • Responsible to answer regarding security information guard system by complying security policy, corporate data protecting, and reporting suspicious activity that defined as threat for information security.