Job Summary
We are seeking a dedicated and skilled Cyber Security Specialist to join our dynamic team on a part-time basis, with potential to convert to a full-time role. The ideal candidate will be responsible for protecting our and client’s information systems and ensuring the integrity, confidentiality, and availability of data. This role requires a strong understanding of various security technologies and practices, as well as the ability to respond effectively to incidents and vulnerabilities.
Responsibilities
- Implement and maintain security measures to safeguard information systems against unauthorized access, breaches, and other cyber threats.
- Conduct regular security assessments, vulnerability research, and penetration testing to identify weaknesses in the network infrastructure.
- Monitor security alerts and incidents using SIEM tools such as Splunk, SolarWinds, or similar technologies.
- Develop and enforce policies related to information security, including compliance with ISO 27001 and ISO 27002 standards.
- Manage identity & access management systems to ensure proper authentication and authorization protocols are followed.
- Collaborate with IT teams on network engineering tasks, including firewall configurations, routing protocols (BGP, OSPF), and VPN setups.
- Respond to security incidents by conducting thorough investigations and implementing incident response plans.
- Maintain knowledge of current cybersecurity trends, threats, and best practices in areas such as cloud computing (AWS, Azure), virtualization (VMware), and operating systems (Windows, Linux).
- Provide training and support for staff on security awareness and best practices.
- Fortinet Expertise: NGFW, SASE, SD-WAN, FortiAnalyzer, FortiManager
- Microsoft Security: Sentinel, Defender XDR, Entra ID, Purview
- SOC operations & SIEM tuning
- Threat hunting & incident response
- Zero Trust architecture
- Security automation & compliance frameworks (ISO 27001, NIST, PCI DSS)
Experience
- Bachelor's degree in Computer Science or a related field is preferred.
- Proven experience in cybersecurity roles with a focus on system security, network security, or information security.
- Familiarity with various operating systems including Solaris, CentOS, macOS, Android, iOS, and Windows.
- Hands-on experience with network protocols (TCP/IP), encryption methods, load balancing techniques, and disaster recovery planning.
- Proficiency in scripting languages such as Python or Bash (Unix shell) for automation tasks.
- Understanding of computer forensics principles and incident response methodologies.
- Experience with network management tools for monitoring infrastructure performance.