Confidential Companyعمان - الأردنتاريخ النشر:2024/04/08 سجلي الدخول للتقدم
Responsibilities
Complies with Information Security documented standards, policies, and procedures.
Ensures team’s compliance with security controls and procedures.
Ensures the secure configuration and operation of security hardware and software.
Provides Information Security Manager with an independent assessment of the adequacy, effectiveness, and sustainability of security operations.
Ensures that necessary changes to security policy documentation are incorporated as directed by the Head of Department.
Works in partnership with other Information Security and IT staff to ensure key security controls are working as intended, recommending improvements where appropriate.
Assists the Information security Manager in evaluating and implementing cost-effective security controls.
Collaborates with security organization team members to assess and analyze security operations and suggests improvement
Maintains up-to-date knowledge of new technologies and their inherent risks especially those which are/planned to be deployed.
Monitors alerts and reports generated by security systems.
Review log files as generated by security devices and servers, making note of anomalies.
Ensures that audit logs record user activities, exceptions, and information security events and are kept for an agreed period.
Monitors configuration settings on the infrastructure to ensure the proper capture and storage of IT events
Compiles reports as required by management or as specified by security policy.
Provides monitoring support for the incident management process acting as the central point of contact for incident reporting.
Maintains security metrics.
Maintains security policy documentation and ensures that necessary changes are incorporated as directed by the manager
Evaluates the extent of compliance with established policies, procedures, control guidelines, and generally accepted industry standards and practices.
Qualifications
Bachelor's Degree in Information Technology/Information Systems/Computer Sciences / Computer Engineering from an accredited 4-5 year program.
The information security analyst may hold vendor-oriented certifications such as those offered by Cisco, Microsoft, Enterasys, Symantec, Oracle, McAfee, etc., or security-related qualifications (CISM, CISSP ).
At least 8 years of experience, with a minimum of 4 years in the Information Security field in the public or private sector. The remainder, in pure IT operation/administration activities including programming, system or network administration, etc.
نحن نستخدم ملفات تعريف الارتباط لضمان حسن سير عمل موقعنا. للحصول على تجربة زيارة محسنة ، نستخدم منتجات التحليل. يتم استخدامها عندما توافق على "الإحصائيات".بيان الخصوصية