Security Infrastructure Management:
• Manage and maintain security infrastructure, including firewalls, intrusion detection/prevention systems, EDR solutions, VPNs, and security monitoring tools.
• Ensure that security systems are up to date and configured to meet industry best practices and compliance requirements.
Incident Response and Forensics
• Lead incident response efforts, including investigation, analysis, and resolution of security incidents.
• Conduct digital forensics and analysis to determine the root cause of security breaches.
• Initiate Incident Response exercises and trainings
Security Policies and Compliance:
• Develop and enforce security policies, standards, and procedures in alignment with industry regulations and best practices.
• Conduct security audits and assessments to ensure compliance with legal and regulatory requirements.
• Maintenance and continuous improvement of ISO 27001 and similar standards within the organization. This includes developing and maintaining policies, procedures, and controls.
Threat Intelligence:
• Monitor emerging threats and vulnerabilities and adjust security measures accordingly.
Documentation:
• Maintain detailed documentation related to security configurations, incident response procedures, and security policies.
• Technologies used
IBM Classic Virtual Cloud, Red Hat Linux, Windows, ETX, Citrix Virtual Apps, Vyatta, VMware, Netscaler, IPSEC, OpenVPN, Java, Oracle, Postgress, IBM Cloud, Ansible, Active Directory, IPA, SAML, SFTP, Server Density, Grafana, Rapid 7, Gitlab