1. Supports security systems, operation administration, monitoring and maintenance of cyber security systems and applications. 2. Monitors security alerts and events. 3. Collects and documents information based on established practices. 4. Supports the preparation and publishing of security advisories. 5. Assists with the analysis of security-related information and events, escalation of incidents for validation and remediation. 6. Required to be on standby with on-call availability with varied shifts including nights, weekends and holidays. 7. Familiar with cyber security standards, protocols and frameworks. 8. Knowledgeable in using various cyber security tools and techniques to monitor and resolve incidents. 9. Alert and vigilant in performing monitoring activities. 10. Able to analyse and resolve security-related issues critically. 11. Communicates clearly in interactions with others. 12. Coordinates effectively with team to perform security operations.
1. Leads the IT function and provides strategic directions, solutions, and policies to support business goals. 2. Develops the information strategy and services to meet business requirements including training and upgrading of systems and/or technology knowledge and skills of all staff to improve productivity through information systems. 3. Directs and promotes governance policies and standards in relation to security, quality, risk, and project management. 4. Leads important innovation initiatives and has ultimate accountability for the function. 5. Provides the highest level of advice and recommendations to the heads of organizations or business units. 6. Has the ability to leverage new and innovative technology to develop strategic directions for the IT functions alignment with organizational objectives. 7. Able to propose solutions and influence key stakeholders to drive commitment for initiatives across the organization.
1. Assists in executing data governance policies and procedures. 2. Is responsible for handling queries, complaints, and disputes on the organisation's management of personal data. 3. Collaborates with business and project teams to support business objectives and strategies and align them with the organisation's data protection guidelines and policies. 4. Manages risks and data breach incidents. 5. Is also responsible for driving awareness of the Personal Data Protection Act requirements in the organisation. 6. Works in a team setting and is knowledgeable of data governance, compliance and data protection policies and frameworks. 7. Is also well-versed in data breach mitigation techniques and procedures. 8. Should be familiar with the requirements of the Personal Data Protection Act 2012. 9. Is confident in making critical decisions and providing quick and impactful resolutions.
1. Responsible for the investigation processes following a cyber-threat or incident. 2. Collects and analyses threat data from the affected systems. 3. Performs forensics investigation and determines the root cause of cyber-attacks. 4. Familiar with different types of threats, cyber security standards, protocols, and frameworks. 5. Acts in accordance with the Cyber Security Act 2018. 6. Knowledgeable of hardware and software applications to analyse threat data from various sources. 7. Diligent and takes an analytical approach to perform analyses and uncover insights. 8. Skilled in synthesising trends and insights. 9. Confident in putting forth creative mitigation plans and solutions to address security incidents.
1. Plans and oversees the performance of security response during the event of a cyber-incident or threat. 2. Proposes mitigation techniques and countermeasures as well as develops cyber security solutions to prevent future attacks. 3. Develops and implements cyber incident response strategies. 4. Presents cyber-incident reports to senior leaders. 5. Required to be on standby with on-call availability with varied shifts, including nights, weekends, and holidays. 6. Familiar with cyber security standards, protocols, and frameworks. 7. Knowledgeable in using various cyber security analysis tools and techniques to resolve incidents. 8. Diligent and watchful in monitoring security operations, systems, and activities. 9. Quick to provide solutions and fix issues when they arise. 10. Adept at dealing with complexity. 11. Articulate and developmental leader within his team.
1. Conducts complex analysis to investigate causes of intrusion, attack, loss, or breach occurring in an organization. 2. Identifies and defines cyber threats and root causes. 3. Develops reports that detail incident timeline, evidence, findings, conclusions, and recommendations. 4. Responsible for managing cyber incidents and resolving them in a timely manner. 5. Prepares reports, communicates findings to senior stakeholders, and recommends corrective actions to prevent and mitigate internal control failures. 6. Required to be on standby with on-call availability with varied shifts, including nights, weekends, and holidays. 7. Familiar with cyber security standards, protocols, and frameworks. 8. Knowledgeable in using various cyber security tools and techniques to resolve incidents. 9. Detail-oriented and adopts a critical and systematic approach in conducting investigations and analyses. 10.Views issues from multiple perspectives and actively communicates his thoughts and engages with other team members.