seeking a proficient and experienced Cyber Security Manager to shape, design and manage the implementation coordinate the response to security incidents, and oversee vulnerability management, risk assessments and collaborate to identify secure, innovative solutions for competitive advantage. · Manage vendor relationships Coordinate security awareness and training programs, recruit and develop staff, set performance management plans Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM), etc. JOB-RELATED
organizational policies, and compile cyber security reports for management and stakeholders. § Promote a collaborative and KPIs to achieve security objectives. Maintain external attack surface management repository, keep abreast Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM), etc. will cyber security practices. § Strong knowledge and understanding of risk and compliance management. JOB-RELATED stakeholders at different levels § Cyber Security Management § IT Risk Management § IT Control Monitoring
Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, Web and Email Security Operations (Security, CISSP will be beneficial) Vulnerability Management (use of well-known vulnerability interpretation of CVSS scores) Required Skills Security Auditing Risk management Incident Investigation Reporting and
Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, Web and Email Security Operations (Security, CISSP will be beneficial) Vulnerability Management (use of well-known vulnerability interpretation of CVSS scores) Required Skills Security Auditing Risk management Incident Investigation Reporting and
Professional (CISSP) Certified Information Security Manager (CISM) Certified Information Systems Auditor
include architecture design, system testing, security management, and second-line support. Requirements include
identify potential areas of improvement. Security Management: Implement and manage security controls within
installations and upgrades Business requirements Security management and data recovery Change control
foundation processes (Patch/Backup/Asset/Security Management). Ability to identify and manage technical
I&O Operations SpecialistSecurity and User Management: