Apply on
Original
Simplified
Job Requirement:
- Candidate must possess at least Bachelor's Degree in Engineering (Computer/Telecommunication) or equivalent.
- At least 2 Year(s) of working experience in the related field is required for this position.
- Preferably Staff (non-management & non-supervisor) specialized in IT/Computer - Software or equivalent.
- Required Skill(s): OSI LAYER, TCP/IP, OWAPS, CVE.
- Strong understanding about Network Security, Networks Architecture, Protocols, and related technologies.
- Having CEH, OSCP, CISSP or other IT related certificates is an advantage.
- Deep knowledge about Operating System Security and such as Windows, Linux and UNIX and Database Security with suitable security configuration.
- Expertise in analysis and handling of security vulnerabilities as well as experience in implementing remedial measures.
- Experience in Information Security or Network Security, related to Penetration Testing, Security analysis, Vulnerability Assessment or Security Management.
- Experience in identifying, analyzing and responding to security incidents.
- An understanding of security frameworks such as ISO 27001 or NIST.
- Good skills in oral and written communication to interact effectively with various stakeholders.
- Ability to work collaboratively with IT and business teams to identify and address security issues.
- Strong analytical skills to analyze security threats, identify vulnerabilities and design effective security solutions.
- Understanding of Cloud Architecture, especially in the area of Cloud Security.
- Knowledge of CICD Pipeline, Kubernetes and several programming languages such as PHP, Golang, Java, Python, Bash is a plus.
- Knowledge of Agile SSDLC (Secure Software Development Lifecycle).
- Proficiency in tools like SIEM systems, vulnerability scanners, and endpoint protection solutions
- Cloud security (AWS, Azure, Google Cloud, Ali Cloud).
- Incident response and penetration testing.
Job Description:
- Manage Security Infrastructure & Implementation Policy.
- Monitoring Suspicious & Anomalous Transaction.
- Business Continuity Plan/Disaster Recovery Plan.
- Analyze need security systems and networks company.
- Design and appropriate implement policy security, including security network arrangement, and security system operation settings.
- Ensure best practices in develop secure application.
- Monitoring systems and networks actively to detect and respond threat using security monitoring tool and intrusion systems detection.
- Finish security incident with fast and appropriate step of remediation.
- Conducting a security audit to identify vulnerability in IT infrastructure.
- Evaluate systems and applications to identify security gap and provide recommendation for troubleshoot.
- Manage and maintain security system, including software updates, security patches, and proper configuration.
- Manage users access and roles, as well as enforce tight policy security.
- Investigate incident security and do forensics analysis or identify cause and effect.
- Responding and self recovering from security attack, including data recovery, system recovery, and repair exploited vulnerability.
- Monitoring latest security trend and development technology to ensure effective protection from new threat.
- Do continous repair regarding to infrastructure security and implement necessary updates related to policies and security practices.
- Documenting and defining policy corporate data security.
- Responsible to answer regarding security information guard system by complying security policy, corporate data protecting, and reporting suspicious activity that defined as threat for information security.
Similar Jobs