Perform initial risk assessment on any new system to identify the level of risk, security gap, and needed security controls.
Analyze business objectives to insure proper risk assessment and control selection.
Identify the needed controls to insure the protection of confidential information, including customer data protection and corporate trade secrets.
Exhibit deep technical understanding and experience with security technologies including, but not limited to, Intrusion Detection/Prevention, Event Co-relation, Firewalls, Antivirus, Anti-spam, policy enforcement, patch/configuration management, secure application development, etc.
Exhibit Thorough understanding of the security controls provided in common platforms and applications in the company environment including but not limited to, Unix, Linux, Windows, Oracle, MS SQL, MySql, and Core Network components (HLR, MSC, STP, BSCs), etc.
Exhibit deep Knowledge of emerging technologies including but not limited to Cloud services, Big Data, and Intern
et of Things (IoT) and the requirements to secure them.
Identify the measures to insure the integrity of information and its resiliency against tampering and fraud.
Establish the needed controls to insure the availability of systems and data to customers and corporate.
Act as a primary stakeholder in all technology projects to advise on security issues.
Insure compliance of the new systems with corporate security policies and industry best practices.
Provide information and advise to executive management on security risks related to new projects/changes/systems, to help management make informed decisions.
Exhibit deep understanding of new technologies and market trends and their associated risks.
Remain at cutting edge knowledge of new Threats and vulnerabilities of information systems and new defense technologies.
Demonstrate deep knowledge of security controls and how to build an ecosystem of layered controls for a successful defense strategy.
Periodically evaluate policies and standards to insure they cover new threats and market needs.
Identify security objectives, missing technologies, and set the road-map for security architecture.
Test and evaluate new security technologies to insure an up to date defense controls and establish a clear return on investment.
Build and maintain information security metrics related to each security control to verify its effectiveness
Manage the implementation of new security solutions until it is fully operational.
Design and build SIEM use cases to identify security intrusions, malware infection, and internal misuse.
Build strong cross-organizational relationships and effectively influence staff across the technology organization and the broader enterprise.
Manage the life cycle of all security technologies
Work closely with other technology architects to ensure that security is properly provisioned in their technology domains
Provide leadership to extend the organizations ability to optimize the use of emerging technologies.
Maintains an expert knowledge in the fields of Information security, Mobile Telecommunications, and Intern
Maintains an oversight of the design and Implementation of Technology systems to ensure appropriate and effective controls are Included.
Demonstrate ability to integrate various security and data protection technologies and controls into a cohesive architecture that sufficiently mitigate risk to the company
Demonstrate experience with the applicable control frameworks and compliance mandates including PCI-DSS, SOX, NTRA mandates.
Responsible for setting the required budget forecast for the new security technologies.
Share knowledge and experience with other security sub departments to enhance the efficiency of work. Apply for here