1. Supports security systems, operation administration, monitoring and maintenance of cyber security systems and applications. 2. Monitors security alerts and events. 3. Collects and documents information based on established practices. 4. Supports the preparation and publishing of security advisories. 5. Assists with the analysis of security-related information and events, escalation of incidents for validation and remediation. 6. Required to be on standby with on-call availability with varied shifts including nights, weekends and holidays. 7. Familiar with cyber security standards, protocols and frameworks. 8. Knowledgeable in using various cyber security tools and techniques to monitor and resolve incidents. 9. Alert and vigilant in performing monitoring activities. 10. Able to analyse and resolve security-related issues critically. 11. Communicates clearly in interactions with others. 12. Coordinates effectively with team to perform security operations.
1. Install, terminate, and test fiber optic cables and systems in various environments, including residential, commercial, and industrial locations. 2. Read and interpret blueprints, diagrams, and specifications to ensure proper installation of fiber optic systems. 3. Perform splicing of fiber optic cables using fusion or mechanical techniques and ensure minimal signal loss. 4. Conduct thorough testing and troubleshooting of fiber optic networks to identify and resolve issues such as signal degradation or breaks. 5. Maintain and repair existing fiber optic infrastructure, including cleaning connectors, replacing damaged components, and upgrading systems. 6. Use specialized equipment such as optical time-domain reflectometers (OTDRs), power meters, and light source tools to measure fiber optic signal strength and quality. 7. Provide technical support and guidance to customers, explaining the capabilities and maintenance of fiber optic systems. 8. Document all installation and repair activities, including test results and site conditions. 9. Adhere to industry standards and safety regulations while performing fiber optic work. 10. Collaborate with project managers, engineers, and other technicians to ensure timely and efficient completion of projects.
1. Monitor and investigate the operational status of cloud systems 2. Understand Security/Risk/Compliance and Regulatory policies 3. Analyse security incidents related to the cloud network 4. Manage scalable architecture to support applications and infrastructure on IaaS and PaaS platforms 5. Evaluate the best cloud solutions for the organisation 6. Incorporate security management and privacy requirements into cloud hardware, software, and applications 7. Design controls and processes that utilise available audit tools 8. Maintain up-to-date and extensive knowledge of cloud products and technology
1. Assists in executing data governance policies and procedures. 2. Is responsible for handling queries, complaints, and disputes on the organisation's management of personal data. 3. Collaborates with business and project teams to support business objectives and strategies and align them with the organisation's data protection guidelines and policies. 4. Manages risks and data breach incidents. 5. Is also responsible for driving awareness of the Personal Data Protection Act requirements in the organisation. 6. Works in a team setting and is knowledgeable of data governance, compliance and data protection policies and frameworks. 7. Is also well-versed in data breach mitigation techniques and procedures. 8. Should be familiar with the requirements of the Personal Data Protection Act 2012. 9. Is confident in making critical decisions and providing quick and impactful resolutions.
1. Plans and oversees the investigation processes and protocols following a cyber-threat or incident. 2. Ensures proper collection and analysis of data. 3. Develops a forensics investigation strategy and oversees the investigations to classify the threat and recommend future actions to affected stakeholders. 4. Familiar with different types of threats, cyber security standards, protocols, and frameworks. 5. Knowledgeable of hardware and software applications for analyzing threat data from various sources. 6. Diligent and watchful during investigation activities. 7. Confident leader who develops plans and solutions to address security incidents. 8. Passionate about engaging and developing others in his team.
1. Responsible for the investigation processes following a cyber-threat or incident. 2. Collects and analyses threat data from the affected systems. 3. Performs forensics investigation and determines the root cause of cyber-attacks. 4. Familiar with different types of threats, cyber security standards, protocols, and frameworks. 5. Acts in accordance with the Cyber Security Act 2018. 6. Knowledgeable of hardware and software applications to analyse threat data from various sources. 7. Diligent and takes an analytical approach to perform analyses and uncover insights. 8. Skilled in synthesising trends and insights. 9. Confident in putting forth creative mitigation plans and solutions to address security incidents.