Manage the overall endpoint security by detecting, analyzing, monitoring, handling, preventing and reducing the effect of the threats and vulnerabilities to the company networks in line with the current endpoint security technologies. Oversee the overall network security at the company. Identify threats to the company networks or security attack vectors and implement the required network protection measures. Roles: • Evaluate the network security protocols, topologies and device configurations. • Analyze log files related to network traffic, firewalls, IDS, IPS, NAC and DNS. • Identify any suspicious activity and its effect on the data and systems. • Implement and test the firewalls, NAC, IDS and IPS systems• Conduct periodic network security audits. • Implementing the network security policies and procedures. • Conduct risk assessments, employee trainings and network monitoring.• Participate in incident response and business continuity management. • Manage VPN profiles and access. • Perform in-depth analysis of the endpoint security and solutions. • Create and install the required endpoint protections such as anti-virus, firewalls etc. based on the gaps identified in the analysis. • Ensure that end point security solutions are implemented across the systems in the company and identifies inconsistencies. • Identify new attack vectors and requirements for detecting an attack.• Plan, develop and implement feature testing. • Maintain up-to-date signatures on the endpoint security agents.• Develop new signatures and rules at the endpoint security agents to detect cyber threats (i.e. YARA rules, queries) • Develop a blacklist/whitelist of the software list for the company endpoints based on known file hashes and functions. • Maintain compliance with the company policies and other regulatory requirements. • Define the endpoint detection strategy and solutions in coordination with the senior management. • Create and conduct trainings on endpoint security practices for the Company employees.• Identify the list of network devices managed the Cybersecurity Operations function and maintain an updated asset inventory defining the criticality and ownership• Maintain a baseline configuration for the network security assets such as internal/external firewalls, IPS/IDS, NAC systems, anti-DDOS and VPN and test firewall and IDS/IPS logs against forensics requirements. • Define roles and responsibilities for team monitoring Network Admission Control logs.• Develop metrics and KPIs to measure effectiveness of NAC deployment and other network perimeter controls. • Document a process for network devices to align with approved security configurations. • Schedule periodic configuration reviews to ensure network device configurations follow best practices. • Deploy Domain Name System Security Extensions (DNSSEC) across the enterprise. • Deploy and implement a file integrity monitoring tool to be used on a weekly basis. • Implement WIDS and integrate with SIEM to identify rogue wireless devices and detect attacks.• Develop a formal process to centrally manage network firewall operations.• Establish guidelines for encrypting email communications and digitally signing emails and integrate with DLP solution once deployed. • Extend content filtering capabilities to include email and file transfer. • Include DDoS prevention considerations in the enterprise security architecture and secure design processes.
Knowledge: • Network components, their operation and appropriate network security controls and methods. • Cybersecurity related threats and vulnerabilities. • Cybersecurity authentication, authorization and access control methods.• Vulnerabilities in applications and their likely impact. • Cybersecurity defense and vulnerability assessment tools and their capabilities. • Host and network access control mechanisms. • Sources of information relating to the identification and effective treatment of vulnerabilities. • Best practices for incident response and incident management. • Cybersecurity and privacy principles and organizational requirements. • Programming language structures and logic. • Virtual Private Network (VPN) security.• National cybersecurity regulations and requirements relevant to company. • Cybersecurity policies, procedures and regulations. • Windows and Unix ports and services. • System administration concepts for operating systems used by Company. • Networking and internet communications fundamentals. • Cybersecurity authentication, authorization and access control methods. • Vulnerabilities in applications and their likely impact. • Host and network access control mechanisms. • Best practices for incident response and incident management. • Cybersecurity and privacy principles and organizational requirements. • Programming language structures and logic. • Virtual Private Network (VPN) security. • Cybersecurity policies, procedures and regulations. • Windows and Unix ports and services. • System administration concepts for operating systems used by company. • Networking and internet communications fundamentals.• Analyze infrastructure build sheets, configuration management databases, vulnerability scans, access control lists and vendor documentation to understand software behaviors and interactions.• Use network analysis tools to identify vulnerabilities. • Network tools. • IT security principles and methods. Qualifications: • Bachelor’s degree in computer science, information systems, or related field. • 7-15+ years in an active technical cybersecurity role. • A minimum of 3+ years of related experience in Endpoint Security. • Experience with EDR and/or incident response toolkits preferred. • CISSP, GIAC Penetration Tester, GIAC Security Essentials or equal certifications. • A minimum of 7 years’ experience as a network security specialist • CEH, CCNP Security, CCSP, CCNA, GSEC, GCI, CISSP or equal certifications.• Certified CompTIA, Microsoft, or Cisco network professional preferred. • Technical troubleshooting skills.
We are a national group formed on the foundations of social responsibility and building the acquired value with hard work and quality of outputs that contribute to creating a fertile production environment for our esteemed customers so that they can present their work in accordance with standards of balanced performance that ensures continuity and reduces the expected risk. More