Cyber Security Supervisor

مصر - Cairo
  • Developing firewalls for network infrastructure, cyber security policies, organization-wide security measures & improving proposed or existing systems.
  • Provides guidance on design, implementation, administration, and enforcement of information security controls to application systems and tools, including network security and monitoring, intrusion prevention, intrusion and endpoint detection and response, virus protection, and identity and access management.
  • working on tracking all endpoint activities within your network to detect malicious threats systematically. Monitor and manage the Endpoint system & the behavior-based antivirus alerts.
  • Identifying and fixing vulnerabilities within existing security systems & Performing penetration tests or working directly with penetration testers to assess potential security problems.
  • Ensure monitoring and reporting to assess the effectiveness of controls & Define, test, and continuously improve response and recovery plans & Ensure good information management practices and compliance to record-keeping standards & Ensure processes to monitor and action external threat advisories.
  • Staying up-to-date on information security management and technological advancements.
  • Maintains comprehensive knowledge of the current cyber threat landscape, cyber security product categories and their application, and available and emerging technologies. 
  • Evaluate technology and current and future security-related requirements and develop or recommend technical and operational solutions to enhance the system's cyber incident response capability.
  • Supervise security team members & manage End Point Security Systems to ensure maximum protection & deliver the cyber security roadmap and build a cyber security culture.

Proven experience in a cybersecurity leadership role.Relevant certifications such as CISSP, CISM, or similar.Strong knowledge of cybersecurity principles, technologies, and best practices.Hands-on experience analyzing high volumes of logs, network data and other attack artifactsExperience with vulnerability scanning solutionsProficiency with antivirus and security softwareBachelor’s degree in Computer Science, Information Systems, or equivalent education or work experience
تاريخ النشر: اليوم
الناشر: Wuzzuf .com
تاريخ النشر: اليوم
الناشر: Wuzzuf .com