responding to alarms raised; following-up for ticket closure with the client and any enhancements to existing cyber security measures.
The job also involves identifying potential threats and performing enhancements to existing cyber security measures as per specifications or policy guidelines.
When a security incident is declared they execute incident response process and document the same.
What does a day in the life of this role look like?
Who are the key clients and what are the projects associated with the role?
Name of the client
What are the major goals aligned to the role?
Main Skills / Profile : Ask the HM to define the essential skills, specific requirements and personal characteristics required for the role
What are the top four skills / competencies required to be successful in the role?
What is the preferred background of the candidate and why?
Diploma in Engineering or any graduate course
Certification in Information systems or related fields, Basic soft skills training, ethical hacking or pertaining to ISO27001
What are the personality traits of a successful candidate for this role?
This job may require the individual to work in a team / shifts. The individual should be result oriented and have a high attention for detail.
The individual should also be able to demonstrate good communication skills and logical thinking with willingness to work in shifts.
Selling Points : Work with the HM to define the key selling points of the role to assist with candidate attraction
Why would someone want this role? What is the value add proposition?
Word Searches : Agree with the HM relevant technologies, qualifications or companies that can be used to assist in the search stream e.
g. Excel, Oracle, PeopleSoft, Capital Markets