Protect organizational assets, data, and infrastructure from cyber threats

Task Description
Security Monitoring & Incident Response Monitor security events and alerts from various sources such as SIEM (Security Information and Event Management) systems, intrusion detection/prevention systems, and endpoint protection platforms.
Investigate and respond to security incidents, including analyzing logs, conducting forensics investigations, and implementing remediation measures to mitigate threats.
Vulnerability Management Conduct vulnerability assessments and penetration tests to identify security weaknesses in systems, networks, and applications.
Prioritize and remediate vulnerabilities based on risk assessment and severity, working closely with system administrators and developers.
Security Architecture & Design Design and implement security controls and solutions to protect systems and data, including network segmentation, encryption, access controls, and identity management.
Review and evaluate security architecture designs for new projects and initiatives, ensuring compliance with industry standards and best practices.
Identity and Access Management (IAM) Develop and enforce IAM policies and procedures to manage user access, authentication, and authorization across systems and applications.
Implement multi-factor authentication (MFA), single sign-on (SSO), and role-based access control (RBAC) mechanisms to strengthen security posture.
Security Compliance and Auditing Ensure compliance with regulatory requirements and industry standards such as GDPR, HIPAA, PCI DSS, and ISO 27001.
Conduct security audits and assessments to verify adherence to security policies and standards, and assist with remediation efforts as needed.
Security Awareness Training Develop and deliver security awareness training programs for employees to educate them about common security threats, best practices, and policies.
Promote a culture of security awareness and accountability throughout the organization.
Threat Intelligence and Research Stay informed about emerging security threats, vulnerabilities, and attack techniques by monitoring threat intelligence feeds, security advisories, and industry reports.
Conduct research and analysis to understand evolving cyber threats and trends, and develop proactive security measures to mitigate risks.
Security Tooling & Automation Evaluate, deploy, and manage security technologies such as firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint security solutions, and security analytics platforms.
Implement security orchestration, automation, and response (SOAR) capabilities to streamline incident response workflows and improve efficiency.
Continuous Improvement & Risk Management Continuously assess and improve security controls, processes, and procedures to adapt to evolving threats and business requirements.
Conduct risk assessments and develop risk management strategies to prioritize security investments and allocate resources effectively.