|
||||||||||||||||||
الوصف الوظيفي This job involves simulating attacks to identify vulnerabilities, testing new software to help protect the company’s data, and helping users adhere to new regulations and processes to ensure the network and systems stay safe. Design, implement, install, monitor, maintain, and upgrade security components The Cyber-Security specialist monitors the organization’s computer networks and systems to identify any violations and security breaches that need to be resolved. Install Security Software The Cyber-Security specialist is responsible for installing and utilizing software, such as firewalls and data encryption programs, to help protect the company’s data and sensitive information. Conduct Tests on Systems The Cyber-Security specialist carries out regular tests to simulate attacks so they can identify areas where the company is vulnerable and ways in which its systems might be exploited by hackers and viruses. Develop Processes and Standards The Cyber-Security specialist develops processes and regulations to ensure the company’s systems stay as safe as possible, in addition to developing security standards for all employees to adhere to. This involves researching the latest information technology security trends and software to help prevent any issues. Prepare Reports The Cyber-Security specialist prepares and creates regular reports to document any process implementation, improvements made, and security breaches that caused damage to the company. Maintenance The Cyber-Security specialist examines the day-by-day performance of the organization’s network and security systems. They also install security software for the endpoints and teach people to use it. Troubleshooting Whether the whole servers go down or an individual is having difficulty accessing email, the Cyber-Security specialist examines the problem and uses his or her expertise to rectify the situation. Ensuring security The Cyber-Security specialist adds users, deal with passwords, deletes old accounts, constructs firewalls, and takes other protective measures to ensure data isn’t compromised and unauthorized users cannot gain access to the system. المهارات https://www.bayt.com/ar/saudi-arabia/jobs/?jobId=4525815 |
||||||||||||||||||