Job Purpose : Secures enterprise information assets by assessing security requirements; planning, implementing, and testing, and monitoring security systems;
administering access controls; identifying and responding to intrusions.Duties :
Assesses security requirements by studying business requirements; conducting system security and vulnerability analyses and risk assessments;
studying architecture / platform.
Plans security systems by developing security standards, policies, and procedures; defining access levels and group isolation;
adhering to industry standards.
Implements security systems by installing preventive measures; administering access controls, user IDs, passwords, and keys;
conducting security awareness programs; providing help desk support; completing documentation.
- Verifies security systems by conducting tests and audits.
- Monitors security by identifying and authenticating system users; identifying and reacting to incidents and intrusions;
ensuring compliance to standards, policies, and procedures; maintaining, distributing, and storing data.
- Upgrades security systems by monitoring security integrity; identifying security gaps; evaluating and implementing enhancements.
- Prepares security reports by collecting, analyzing, and summarizing system use data and trends; logging unauthorized attempts to access protected resources and commands.
- Updates job knowledge by tracking and understanding emerging security practices and standards; participating in educational opportunities;
reading professional publications; maintaining personal networks; participating in professional organizations.
Enhances department and organization reputation by accepting ownership for accomplishing new and different requests; exploring opportunities to add value to job accomplishments.
Skills / Qualifications : Network Security, Network Protocols, TCP / IP Networks, Reporting Skills, Analyzing Information , Decision Making, Process Improvement, Verbal Communication, Functional and Technical Skills, Dependability, Information Security Policies