Job Overview
The Security Engineer is tasked with the vital responsibility of implementing and maintaining robust security protocols to safeguard the organization's data and infrastructure. This hands‑on position entails executing security strategies, as well as installing and configuring vital security apparatus, such as firewalls and intrusion detection systems. The Security Engineer is responsible for applying and maintaining security measures to protect critical data and infrastructure. Installing, configuring, and managing security systems and software. Identifying and remediating detected vulnerabilities on time. Responding swiftly to security breaches or incidents. Ensuring the continuous secure operation of the IT environment. Staying abreast of the latest developments in security technologies, threats, and countermeasures. The Security Engineer is essential in maintaining the integrity and security of the organization's digital resources, ensuring they are shielded from potential cyber threats through diligent maintenance and proactive monitoring.
Key Responsibilities
- Security Implementation
- Implement security controls based on guidelines and designs provided by the security architect.
- KPIs: Number of security controls implemented within the specified timeline; Percentage of implemented controls functioning as expected.
- Security Configuration
- Configure and manage security solutions, including firewalls, intrusion detection systems, anti‑virus software, and data encryption.
- KPIs: Number of security configurations completed within scope, time, and budget; Percentage of configured solutions functioning without critical issues.
- Vulnerability Remediation
- Apply patches and modifications to fix identified vulnerabilities.
- KPIs: Mean time to remediate vulnerabilities; Number of exceptions; Average age of open vulnerabilities.
- Security Monitoring and Incident Response
- Monitor security systems for anomalies, respond to security incidents, perform initial analysis, and elevate as necessary.
- KPIs: Number of security incidents detected and responded to within an acceptable timeframe; Mean time to identify and elevate critical incidents.
- Compliance Checks
- Resolve identified compliance issues from regular checks to ensure the systems comply with the organization’s security policies and standards.
- KPIs: Compliance rate with security standards and policies; Number of non‑compliance issues identified and resolved.
- End‑user Security
- Implement end‑user security practices, like password management and access controls.
- KPIs: Percentage of end‑users adopting implemented security practices; Number of end‑user‑related security incidents.
- Vendor Management Support
- Coordinate with vendors to ensure the correct implementation and functioning of security systems.
- KPIs: Vendor SLA compliance rate; Number of successful interactions and resolutions with vendors.
- Updating and Upgrading Security Systems
- Regularly update and upgrade security systems in line with technological advancements and evolving threats.
- KPIs: Number of successful updates and upgrades completed within the specified timeline; Reduction in security incidents due to outdated systems.
- Training and Mentorship
- Train team members on security operations, troubleshooting, and best practices.
- KPIs: Number of training sessions conducted; Team member satisfaction rate with training.
- Staying Abreast of Emerging Technologies
- Continually educate themselves on the latest cybersecurity trends, threats, and technology advancements to ensure the company’s security measures are updated.
- KPIs: Number of relevant technology updates incorporated into the environment; Number of industry events attended or certifications obtained.
- Team Collaboration
- Participate in cross‑functional projects, enhance system integration, and collaboration.
- KPIs: Participate in at least one major cross‑functional project per year.
- Miscellaneous and General Responsibilities
- Complete any assigned work‑related duties and responsibilities.
- KPIs: Completion rate of assigned duties and responsibilities; Overall satisfaction rate in the performance of miscellaneous duties.
Requirements
Knowledge Requirements
- Cybersecurity Principles: Extensive understanding of cybersecurity protocols, principles, and best practices, particularly for enterprise and cloud infrastructures.
- Security Systems: Expertise in managing, configuring, and troubleshooting security systems, such as firewalls, intrusion detection systems, antivirus software, authentication mechanisms, and log management tools.
- Vulnerability Remediation: Proficiency in using assessment tools and techniques for vulnerability identification and remediation.
- Security Incident Response: Familiarity with the protocols and procedures for responding to, documenting, and resolving security incidents.
- Network and System Security: Good understanding of network and system security principles, including knowledge of encryption technologies, IPsec, VPNs, and network protocols.
- Cloud Security: Knowledge of security controls for leading cloud platforms like AWS, Azure, and Google Cloud.
- Compliance Standards: Understanding of IT compliance and security standards such as ISO *****, NIST, PCI DSS, and GDPR.
- Emerging Security Technologies: Awareness of the latest cybersecurity technologies and trends.
- IT Service Management Frameworks: Knowledge of frameworks and processes such as ITIL.
Qualifications
- Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Industry Certifications: CISSP, CEH, or CISM certifications are preferred.
- Cloud Security Certifications: Credentials from AWS, Google Cloud, or Microsoft Azure are advantageous.
- Other Certifications: Certifications like ITIL, CRISC, or CISA are beneficial.
Experience
- Security Implementation: Hands‑on experience with security measures such as firewalls, intrusion detection systems, antivirus software, and data encryption.
- Vulnerability Assessment and Remediation: Experience in vulnerability detection and the implementation of remediation strategies.
- Security Protocols and Technologies: Deep experience with security protocols, encryption technologies, and network protocols.
- Incident Response: Experience in managing security incidents and performing threat hunting.
- Network Security: Skills in implementing network security measures.
- Cloud Security: Experience with security in cloud environments like AWS, Azure, or Google Cloud.
- Compliance: Experience with compliance management according to relevant standards and regulations.
Technical Skills
- Security Tools: Proficiency in using security tools including firewalls, intrusion detection systems, and antivirus software.
- Vulnerability Assessment Tools: Experience with tools like Nessus, Open VAS, and Qualys.
- Network Security: Skills in managing network security protocols and systems.
- Programming and Scripting: Proficiency in scripting languages like Python or Bash.
- Cloud Security Tools: Knowledge of tools specific to cloud security.
- Encryption Technologies: Understanding of encryption and secure communication technologies.
- Incident Response Tools: Ability to utilize tools for quick response to security breaches.
- IT Service Management Frameworks: Familiarity with frameworks like ITIL.
- Problem‑solving: Strong ability to troubleshoot and resolve complex network issues.
- Detail‑oriented: Meticulous in planning, execution, and documentation.
- Communication Skills: Excellent communication skills, with the ability to explain complex technical issues in simple terms.
- Teamwork and Collaboration: Strong team player with effective collaboration skills.
- Continuous Learning: Commitment to continuous skill improvement and staying current with industry trends.
- Customer Focus: Dedicated to meeting customer needs and maintaining high satisfaction levels.
- Adaptability: Openness to adopting new technologies and methods.
- Stress Management: Capable of handling pressure and urgent situations effectively.
- Time Management: Efficient in prioritizing tasks and managing time.
- Ethics and Integrity: High ethical standards and integrity in professional conduct.
Salary is market related.
Posted By Alinta Tech Solutions HR Services, Recruitment & Selection