Oversea on and maintain all network appliances, such as wireless access points, firewalls, routers, and switches.
Oversee and manage web, email, and internet security for the entire company.
Track, observe, analyze and resolve any vulnerability or security issue.
Keep an eye out for future CVEs and make sure impacted systems are being patched accordingly.
Respond and address any potential security incidents or vulnerabilities.
Serve as the point of contact for any security incidents to ensure timely response, isolation, remediation, or resolution.
Ensure that the organizations network and systems are regularly tested to identify security flaws and inefficiencies.
Keep up with new cybersecurity threats and modify CIS Benchmarks to proactively protect against any new or emerging security risks.
Ensure that the structure and policies for IT and cyber security are timely and current.
Protect all network components, including but not limited to computer networks, LANs, WANs, internet connections, intranet, VPNs, VLANs, VoIP, and other systems for data communication.
Raise user awareness by providing ongoing cybersecurity education
Expertise in conducting regular vulnerability assessments to prevent security incidents.
Knowledge of the most recent techniques employed by hackers and other harmful actors to access systems.
The ability to detect any suspicious activity in the network and system using the technologies at hand.
Soft skills, such as good teamwork and management relationships.
Understanding of applicable legal requirements for compliance with cyber laws.
The capacity to thoroughly examine computer networks and spot any security holes in the architecture. A network security engineers essential personality feature is attention to detail.
Requirements
At least a Bachelor\xe2\x80\x99s degree in Information Systems, Computer Science, or any relevant field.
Minimum 5 - 8 years of working experience in any relevant field.
Advance knowledge of TCP/IP, standard networking ports and protocols, traffic flow, system administration, the OSI model, defense-in-depth, and other basic security components.
Practical experience in conducting incident investigations by examining large volumes of logs, network data (such as Full-Packet Capture FPC), and other attack artifacts.
Vulnerability scanning and monitoring solutions experience.
Knowledge of various Cloud Security services including Office365 (e.g., GCP, AWS, Azure).
Knowledge of VMware technologies, as well as mobile OS (such as Android, Huawei, iOS, and Windows), is a plus.