|
||||||||||||||||||
Job Description and Requirements Develop, update, and implement security measures and controls for all information systems, in particular for the Management Information System (MIS). Secure data and information systems, protecting them from unauthorized access or tampering. Provide technical support and monitor security access, ensuring that the Project Team and Supply Chain Partners are aware of security restrictions and adhere to access and system use across the programme and locations. Perform regular internal and external security audits. Develop better logging, boundary rules and reporting techniques to identify and minimise intrusion. Respond to cyber events or incidents in accordance with the Cyber Incident Management Plan, escalating and supporting as appropriate. and. Analyse the source of security breaches, if possible, identify perpetrators and liaise with our Contract Security Manager and the client’s Principal Security Advisor (PSyA) as appropriate. Recommend and implement security tools and anti-malware software. Determine, adapt, and maintain corporate security procedures and policies, actively monitoring industry and international practices and identifying and implementing any actions to remain compliant. Provide staff with security awareness training and advisories on a regular basis and identify customer and client specialists to mentor and train to transfer cyber security aspects to the customer and user community as part of the transformation programme. Coordinate security measures with external contacts, ensuring compliance with all relevant client and customer IT policies and implement new security instructions and policies as and when introduced by the customer. Inform management of security vulnerabilities. Lead on cyber security certification Specific: Main duties could include providing advice on: Maintain built in security controls & posture during the operation of the system, including any changes that may occur on software systems, networks and data centres looking for vulnerabilities and risks in hardware and software finding the best way to secure the IT infrastructure of our, the client and the customers’ organisations, as requested how to improve defences and cyber resilience at all levels in a cost-effective way, constantly monitoring for attacks and intrusions when the cyber security specialist finds a potential threat or attempted breach, closing off the security vulnerability following the agreed processes identifying trends in attack perpetrators and liaising with the Client as necessary Other tasks as given by the Contract Security Manager or the Project Execution Manager Experience and Skills: https://www.akhtaboot.com/en/saudi-arabia/jobs/riyadh/133924-Cyber-Security-Specialist-at-KBR |
||||||||||||||||||