Registered Users
1,886,490
Posted Jobs
104,221
Key responsibilities of the incumbent will include, but not limited to, the following:
   
Use and maintain open-source/commercial information security testing and monitoring tools and services.
Conduct software vulnerability assessment exercises to identify and patch software vulnerabilities.
Perform penetration-testing and web applications security assessment exercises of IT infrastructure and business applications.
Perform Risk Assessment of IT infrastructure, systems, and projects.
Analysis of components of IT infrastructure and report vulnerabilities and weakness.
Perform basic digital forensics and related examination on reported and identified IT security incidents.
Real-time monitoring and maintenance of security monitoring controls and logging solutions i.e. SIEM.
Observe user activities, review logs, report breaches and exceptions on a regular basis.
Monitor real-time interfaces of critical security controls like Firewalls, IDS/IPS, and Antivirus etc.
Assist in documentation and implementation of IT Security policies, frameworks, SOPs, standards and other legislative requirements.
   

 Eligibility Criteria:

   
Education

Must have a Master's or Bachelo's Degree (minimum 16 years of education) in Cyber Security, Computer Sciences/Engineering, Telecommunication, or other relevant field from HEC recognized university or from a reputable foreign university. International IT Security certifications (CISSP, CEH, CPTE, CISM etc.) will be an added advantage.

Age: Maximum 31 years of age. Relaxation maybe allowed in case of additional relevant experience or better qualification.
Experience:

Must have at least 03 years of post-qualification experience of IT/IT Security with 02 years in IT Security, in a reputable firm of relevant field/area.

Hands on experience of security tools like Metasploit Framework, SIEM, Software Vulnerability Assessment Solutions, Threat Intelligence platform, IDS/IPS, Endpoint Security solutions, Sandboxing platforms, Virtualization solutions, Wireshark, Web Application scanners and other Wireless Network Security tools etc.




Spotlight