Job Description
You will be a member of the Group Information Security Team responsible for initiating, implementing, and maintaining security products and solutions to support enterprise security.
Key Responsibilities:
ā¢Subject matter expert (SME) for the security systems owned by the Information Security Team.
ā¢Ensure security systems are utilized to their maximum capabilities.
ā¢Plan, identify, assess, design, operationalize, and maintain multiple security-related software and/or hardware.
ā¢Recommend and drive cyber security solutions and initiatives to improve the cyber security of the organization.
ā¢Prepare RFQ and evaluation criteria. Proof of concept (POC) during product evaluation. Liaising with vendors to implement security solutions.
ā¢Provide security consultancy, technical guidance, expertise, solutions, and education.
ā¢Advise infrastructure teams on security design that is relevant and fit for purpose.
ā¢Identify and assess cyber risks in the IT infrastructure environment.
ā¢Review firewall requests.
ā¢Keep up to date on emerging security threats and vulnerabilities on new platforms adopted by the SIA Group and propose mitigating controls.
ā¢Any relevant ad-hoc duties. Manage individual project priorities, deadlines, and deliverables.
ā¢This is an individual contributor role. Deliver tasks with minimal supervision.
ā¢Provide AUDIT support such as PCI-DSS, and Cyber Maturity Assessment.
ā¢Strong communication skills.
ā¢Coordinate and Deploy SIA Group/GIT cybersecurity initiatives in Scoot.
Requirements:
ā¢Degree in IT or related field, with at least 5 years in information security, especially in the cybersecurity space.
ā¢Professional security certifications (SANS, CISSP, CEH, OSCP, CISA, etc) preferred.
ā¢Experience in security products POC and RFQ.
ā¢Prior experience in implementing and maintaining any of the tools for EDR, XDR, SOAR, SIEM, UEBA, PAM, AM, etc., and/or network security. Able to review firewall requests.
ā¢Technical proficiency in one or more of the following security areas: network design, zero trust, Internet of Things, cryptography, etc.
ā¢Familiar with common web/mobile application vulnerabilities and technical knowledge to address and mitigate vulnerabilities. Any prior vulnerability management experience is preferred.
ā¢Knowledge of cyber security threats, vulnerabilities, hacking, exploit methods, etc.
ā¢Strong oral, written, presentation, and inter-personal skills.
ā¢Possess a positive attitude with drive, initiative, enthusiasm, and a keen sense of urgency in resolving high-priority issues.
ā¢Able to work independently and in a team-oriented, collaborative environment.