Position Objective
Enhance our cybersecurity Infrastructure by using Zero Trust concepts with our technology stacks and responding to alerts from the SOC team.
This includes finding vulnerabilities, handling incidents, and supporting disaster recovery and backups.
Protect our digital assets from new threats by following industry best practices and regulations. Provide technical cybersecurity knowledge and solutions to help users understand and address cybersecurity issues.
Major Areas of Accountability
Device and Application Identification : Utilize Microsoft Intune MDM tool to identify and manage devices in the network.
Incorporate advanced threat detection tool for comprehensive application identification. Create accurate network topology maps and analyze data flow.
Network and Endpoint Protection : Implement and manage Pulse Secure VPN for secure network access. Use Cisco Meraki and Fortinet Fortigate for firewall protection, and deploy SentinelOne / CrowdStrike for Endpoint Detection and Response.
Enforce MFA with conditional acess. Manage DLP solutions to safeguard sensitive information.
- Security Monitoring and Threat Detection : Utilize Securonix / Google Chronicle for SIEM to monitor and respond to security events.
- Incident Response and Recovery : Use Microsoft Azure Site Recovery to ensure effective disaster recovery and backup solutions.
Manage and respond to security incidents using established protocols and tools, and conduct Red Team and Blue Team exercises.
Penetration Testing and Vulnerability Management : Conduct regular penetration testing and vulnerability scanning with Nessus Tenable to identify and address security weaknesses.
Analyze findings to enhance security measures and reduce risk exposure.
- Security Awareness and Training : Implement security awareness training programs using KnowBe4 and Curricula to educate users about cybersecurity best practices and threats.
- Compliance and Best Practices : Adhere to guidelines from NIST CSF, CIS18, and the MITRE framework to ensure compliance with industry best practices and regulatory requirements.
Regularly review and update security policies to address emerging threats and vulnerabilities.
- Off-hours Duty : On-duty employee is required to be available and handle problem according to SOPs.
- Technology Solutions and Support : Provide technical cybersecurity knowledge and solutions to help users understand and address cybersecurity issues.
- Perform additional tasks assigned by the management
Qualifications
- Previous cyber security related experience a plus.
- Master higher level skills in the specific job area.
- Experience or competence of accomplished project with significant contributions.
- Professional skills required for the tasks described in INDIVIDUAL SPECIFIC JOB TASKS session.
- Applicant should possess strong logical design as well as problem-solving, critical thinking, and communication skills.
- Qualified candidate will also possess good knowledge of computer programming languages, computer system analysis, and network infrastructure.
- Excellent oral / written communication skills (required in English and preferred in Mandarin)
Computer literacy and proficiency in documentation skills
4-year college degree required with Computer Science or MIS related majors, advanced degree preferred
Check Out Our Benefits
Health Coverage and Perks Excellent medical, dental, and vision insurance plans
Flexible spending accounts for health, dependent care Short-term Disability Long-term Disability Group Term Life, Dependent andSupplemental Life InsuranceTuition Reimbursement
Work / Life Balance
10 Paid Holidays
Paid Time Off for a balanced life
Vacation, Sick and Personal Time)
FlexTime Available
Competitive Compensation
Competitive salary, incentive / bonus, 401(k) plan with company match,
Cash Balance, Pension Plan