About the position
JOB PURPOSE
Apply technical knowledge and expertise in designing, building, implementing and maintaining secure complex systems and architectures to ensure the security and safety of data systems within the FIC in order to support the overall strategic direction and targets of the ICT division and data driven intelligence and decisions across the FIC.
KEY PERFORMANCE AREAS
Security Systems Architecture Design and Modelling:
• Engage with relevant business units to understand and scope project requirements and identify information needs.
• Define and design cyber security architecture solutions and blueprints including firewalls, intrusion detection and prevention systems, VPNs, encryption and access control systems in line with business requirements and ICT security principles and standards to ensure standardisation, detection and risk management.
• Review and ensure that cyber security architecture designs provide seamless integration, scalability, performance, cost effective measures and security.
• Configure and secure operating systems, networks, and applications to minimise security vulnerabilities across the organisation.
• Perform feasibility studies and experiments to determine the resolution of an identified business need.
• Design and implement conceptual, logical and physical security architectural models relevant to the needs and changes of the business and the external cyber environment.
• Translate complex technical security concepts and architectural designs into clear and understandable language for technical and non-technical audiences.
• Develop a comprehensive cyber security roadmap that supports current and future data needs, including big data, analytics, automation and AI or machine learning initiatives to proactively detect and respond to cyber threats.
• Collaborate with development teams to integrate security into the software development lifecycle.
• Develop and maintain all cyber security architecture templates and provide input for templates in other security domains for consistency.
• Research, evaluate and recommend appropriate cyber security solutions, technologies, tools, and platforms to meet security requirements and business needs.
• Define security related position papers to assist in the adoption of new technologies and standard setting for the organisation.
• Interpret and apply approved cyber security design principles, policies, procedures in security architecture work
Security Monitoring Support:
• Monitor security information and event management systems, intrusion detection and prevention systems, firewalls and other security tools for suspicious activities, security alerts and potential threats and set-up preventative measures to address any gaps.
• Analyse security events and logs to identify false positives, prioritise legitimate alerts and initiate appropriate response procedures in collaboration with the Cyber Security Analyst and Cyber Security Lead.
• Review security dashboards and reports to identify trends and potential areas of concern in collaboration with the Cyber Security Analyst and Cyber Security Lead.
• Coordinate the deployment, configuration and maintenance of various security technologies such as endpoint detection and response, firewalls, email security gateways, web application firewalls, identity and access management solutions in collaboration with the Cyber Security Analyst and Cyber Security Lead.
• Review and ensure that security tools are optimally configured, updated and performing in collaboration with the Cyber Security Analyst.
• Provide security recommendations and input during the design and implementation phases of new IT projects, systems and applications to ensure that the organisation is safeguarded against threats.
• Assist in the containment, eradication, and recovery phases of security incidents.
• Collaborate with the Cyber Security Analyst, Cyber Security Lead and ICT Teams and external partners and stakeholders during incident resolution.
Vulnerability and Security Testing Support:
• Analyse scan results and prioritise vulnerabilities based on risk, and work with system owners to track remedial activities.
• Coordinate the testing of existing and new systems for security vulnerabilities and provide inputs to projects and operations.
• Conduct vulnerability scans and penetration tests on networks, applications and systems using automated tools and manual techniques in collaboration with the Cyber Security Analyst and relevant ICT stakeholders.
• Stay up to date with emerging threats, vulnerabilities and security advisories, assessing their potential impact on the organisation.
• Assist in identifying process improvements and contribute to valid inputs into cyber security discussions to enhance cyber security performance, reliability and stability.
• Participate in risk assessments of ICT infrastructure and applications and recommend appropriate improvements in collaboration with the Cyber Security Analyst and relevant ICT stakeholders.
• Participate in Disaster Recovery activities when required.
Data Governance:
• Implement data quality checks and validation processes to ensure data accuracy and consistency.
• Perform quality assurance tests on the system to support data integrity and quality protocols.
• Support data integrity by ensuring that all data is verified within reasonable parameters and line of sight.
• Ensure the classification and protection of data assets as per agreed protocols.
• Assist in communicating cyber security problems and queries within agreed upon timeframes to relevant stakeholders.
• Assist in the maintenance of accurate and complete cyber security processes, source and technical documentations and ensure the traceability of procedures and methods.
Cyber Security Advocacy and Awareness:
• Coordinate and provide technical advocacy, regular training and/or awareness to relevant stakeholders on cyber security as per ICT protocols.
• Assist in the transfer of skills to team members to enhance overall effectiveness and capacity when required.
• Stay abreast of industry trends, best practices and new technologies in cyber security
Stakeholder Management:
• Conduct briefings and presentations with internal stakeholders to gain insight and determine requirements for cyber security systems.
• Ensure continuous stakeholder interface for seeking clarities, closing gaps, and enriching the data integrity of business intelligence decisions.
• Participate in cross-functional projects when required to ensure the execution of planned projects against agreed timeframes.
• Represent the organisation at working groups, meetings, conferences and seminars when required
Risk and Compliance Management:
• Monitor user security compliance across the organisation and ensure that all users comply with security protocols and advise on remedial action in the event of non-compliance.
• Extract and submit compliance exception reports to relevant stakeholders as per standard protocol.
• Assist in the development and enhancement of standards, processes, and policies within the ICT division.
• Provide input into tactical plans and targets when required.
• Implement fraud controls, risk prevention principles, sound governance and compliance processes, and tools to identify and manage risks with the business unit.
• Assist in monitoring changes in the regulatory environment and the implementation of appropriate operational controls to address new requirements.
• Support and provide evidence to internal and external audit requirements when required.
• Maintain quality risk management standards in line with the organisation's risk management framework.
• Maintain and enforce all related Service Level Agreements to minimise business risk and ensure business continuity
• Adhere to all relevant laws, policies and Standard Operating Procedures throughout the organisation
EDUCATION, SKILLS AND EXPERIENCE
• Degree in Information Technology
• Information Systems and Audit Control Association (ISACA) Preferred
• International Information System Security Certification Consortium (ISC2) Preferred
• CompTIA Security+ Certification
• Systems Security Certified Practitioner (SSCP) Certification
• Microsoft Security Associate Certification
• Microsoft Security Compliance Certification
• Microsoft Security Operations Analyst Certification
• Azure Security Engineer Certification
• Firewall Certified
• MS 365 Associate Certification
• Certified Cloud Security Professional
• 5 years' experience in Information Technology
• 5 years' experience in Cyber Security and End-User protection
• 5 years' experience in Vulnerability Management
• 3 years' experience Cloud Security
• 3 years' experience Microsoft 365 Security
• Cyber Security protocols-knowledge of Cyber Security protocols
• Kusto Query Language-knowledge of Kusto Query language
• Azure Cloud Platform-knowledge of Azure Cloud platform
• Data Storage and Processing protocols-knowledge of Data storage and processing protocol
• Open-Source Intelligence Collection-knowledge of collecting Open-Source intelligence
• Vulnerability Testing Protocols-knowledge of Vulnerability Testing protocols
• Firewall Management Principles-knowledge of Firewall Management principles